<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">ntp-4.2.8p15-7.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11102</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">ntp-4.2.8p15-7.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the ntp-4.2.8p15-7.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11102</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11102</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9042/</URL>
      <Description>SUSE CVE CVE-2016-9042 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6451/</URL>
      <Description>SUSE CVE CVE-2017-6451 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6458/</URL>
      <Description>SUSE CVE CVE-2017-6458 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6460/</URL>
      <Description>SUSE CVE CVE-2017-6460 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6462/</URL>
      <Description>SUSE CVE CVE-2017-6462 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6463/</URL>
      <Description>SUSE CVE CVE-2017-6463 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6464/</URL>
      <Description>SUSE CVE CVE-2017-6464 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12327/</URL>
      <Description>SUSE CVE CVE-2018-12327 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7170/</URL>
      <Description>SUSE CVE CVE-2018-7170 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7182/</URL>
      <Description>SUSE CVE CVE-2018-7182 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7183/</URL>
      <Description>SUSE CVE CVE-2018-7183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7184/</URL>
      <Description>SUSE CVE CVE-2018-7184 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7185/</URL>
      <Description>SUSE CVE CVE-2018-7185 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-8956/</URL>
      <Description>SUSE CVE CVE-2018-8956 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8936/</URL>
      <Description>SUSE CVE CVE-2019-8936 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11868/</URL>
      <Description>SUSE CVE CVE-2020-11868 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-13817/</URL>
      <Description>SUSE CVE CVE-2020-13817 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15025/</URL>
      <Description>SUSE CVE CVE-2020-15025 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ntp-4.2.8p15-7.2">
      <FullProductName ProductID="ntp-4.2.8p15-7.2">ntp-4.2.8p15-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ntp-dcf77-tools-4.2.8p15-7.2">
      <FullProductName ProductID="ntp-dcf77-tools-4.2.8p15-7.2">ntp-dcf77-tools-4.2.8p15-7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ntp-doc-4.2.8p15-7.2">
      <FullProductName ProductID="ntp-doc-4.2.8p15-7.2">ntp-doc-4.2.8p15-7.2</FullProductName>
    </Branch>
    <Relationship ProductReference="ntp-4.2.8p15-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ntp-4.2.8p15-7.2">ntp-4.2.8p15-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ntp-dcf77-tools-4.2.8p15-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2">ntp-dcf77-tools-4.2.8p15-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ntp-doc-4.2.8p15-7.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2">ntp-doc-4.2.8p15-7.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.</Note>
    </Notes>
    <CVE>CVE-2016-9042</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9042.html</URL>
        <Description>CVE-2016-9042</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030050</URL>
        <Description>SUSE Bug 1030050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038049</URL>
        <Description>SUSE Bug 1038049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044525</URL>
        <Description>SUSE Bug 1044525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mx4200_send function in the legacy MX4200 refclock in NTP before 4.2.8p10 and 4.3.x before 4.3.94 does not properly handle the return value of the snprintf function, which allows local users to execute arbitrary code via unspecified vectors, which trigger an out-of-bounds memory write.</Note>
    </Notes>
    <CVE>CVE-2017-6451</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6451.html</URL>
        <Description>CVE-2017-6451</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030050</URL>
        <Description>SUSE Bug 1030050</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.</Note>
    </Notes>
    <CVE>CVE-2017-6458</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6458.html</URL>
        <Description>CVE-2017-6458</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030050</URL>
        <Description>SUSE Bug 1030050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038049</URL>
        <Description>SUSE Bug 1038049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044525</URL>
        <Description>SUSE Bug 1044525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.</Note>
    </Notes>
    <CVE>CVE-2017-6460</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6460.html</URL>
        <Description>CVE-2017-6460</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030050</URL>
        <Description>SUSE Bug 1030050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038049</URL>
        <Description>SUSE Bug 1038049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044525</URL>
        <Description>SUSE Bug 1044525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the legacy Datum Programmable Time Server (DPTS) refclock driver in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via a crafted /dev/datum device.</Note>
    </Notes>
    <CVE>CVE-2017-6462</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6462.html</URL>
        <Description>CVE-2017-6462</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030050</URL>
        <Description>SUSE Bug 1030050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038049</URL>
        <Description>SUSE Bug 1038049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044525</URL>
        <Description>SUSE Bug 1044525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote authenticated users to cause a denial of service (daemon crash) via an invalid setting in a :config directive, related to the unpeer option.</Note>
    </Notes>
    <CVE>CVE-2017-6463</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6463.html</URL>
        <Description>CVE-2017-6463</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030050</URL>
        <Description>SUSE Bug 1030050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038049</URL>
        <Description>SUSE Bug 1038049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044525</URL>
        <Description>SUSE Bug 1044525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote attackers to cause a denial of service (ntpd crash) via a malformed mode configuration directive.</Note>
    </Notes>
    <CVE>CVE-2017-6464</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:N/AC:H/Au:M/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6464.html</URL>
        <Description>CVE-2017-6464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1030050</URL>
        <Description>SUSE Bug 1030050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1038049</URL>
        <Description>SUSE Bug 1038049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044525</URL>
        <Description>SUSE Bug 1044525</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.</Note>
    </Notes>
    <CVE>CVE-2018-12327</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12327.html</URL>
        <Description>CVE-2018-12327</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098531</URL>
        <Description>SUSE Bug 1098531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107887</URL>
        <Description>SUSE Bug 1107887</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111552</URL>
        <Description>SUSE Bug 1111552</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1111853</URL>
        <Description>SUSE Bug 1111853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155513</URL>
        <Description>SUSE Bug 1155513</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.</Note>
    </Notes>
    <CVE>CVE-2018-7170</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7170.html</URL>
        <Description>CVE-2018-7170</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082210</URL>
        <Description>SUSE Bug 1082210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083424</URL>
        <Description>SUSE Bug 1083424</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087324</URL>
        <Description>SUSE Bug 1087324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098531</URL>
        <Description>SUSE Bug 1098531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155513</URL>
        <Description>SUSE Bug 1155513</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.</Note>
    </Notes>
    <CVE>CVE-2018-7182</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7182.html</URL>
        <Description>CVE-2018-7182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082210</URL>
        <Description>SUSE Bug 1082210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083426</URL>
        <Description>SUSE Bug 1083426</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087324</URL>
        <Description>SUSE Bug 1087324</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.</Note>
    </Notes>
    <CVE>CVE-2018-7183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7183.html</URL>
        <Description>CVE-2018-7183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082210</URL>
        <Description>SUSE Bug 1082210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083417</URL>
        <Description>SUSE Bug 1083417</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087324</URL>
        <Description>SUSE Bug 1087324</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.</Note>
    </Notes>
    <CVE>CVE-2018-7184</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7184.html</URL>
        <Description>CVE-2018-7184</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082210</URL>
        <Description>SUSE Bug 1082210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083422</URL>
        <Description>SUSE Bug 1083422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087324</URL>
        <Description>SUSE Bug 1087324</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.</Note>
    </Notes>
    <CVE>CVE-2018-7185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7185.html</URL>
        <Description>CVE-2018-7185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1082210</URL>
        <Description>SUSE Bug 1082210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1083420</URL>
        <Description>SUSE Bug 1083420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1087324</URL>
        <Description>SUSE Bug 1087324</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1089405</URL>
        <Description>SUSE Bug 1089405</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ntpd in ntp 4.2.8p10, 4.2.8p11, 4.2.8p12 and 4.2.8p13 allow remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via soofed mode 3 and mode 5 packets. The attacker must either be a part of the same broadcast network or control a slave in that broadcast network that can capture certain required packets on the attacker's behalf and send them to the attacker.</Note>
    </Notes>
    <CVE>CVE-2018-8956</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8956.html</URL>
        <Description>CVE-2018-8956</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171355</URL>
        <Description>SUSE Bug 1171355</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NTP through 4.2.8p12 has a NULL Pointer Dereference.</Note>
    </Notes>
    <CVE>CVE-2019-8936</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8936.html</URL>
        <Description>CVE-2019-8936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1128525</URL>
        <Description>SUSE Bug 1128525</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148892</URL>
        <Description>SUSE Bug 1148892</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1155513</URL>
        <Description>SUSE Bug 1155513</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.</Note>
    </Notes>
    <CVE>CVE-2020-11868</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11868.html</URL>
        <Description>CVE-2020-11868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169740</URL>
        <Description>SUSE Bug 1169740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance.</Note>
    </Notes>
    <CVE>CVE-2020-13817</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-13817.html</URL>
        <Description>CVE-2020-13817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1172651</URL>
        <Description>SUSE Bug 1172651</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file.</Note>
    </Notes>
    <CVE>CVE-2020-15025</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ntp-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-dcf77-tools-4.2.8p15-7.2</ProductID>
        <ProductID>openSUSE Tumbleweed:ntp-doc-4.2.8p15-7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15025.html</URL>
        <Description>CVE-2020-15025</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173334</URL>
        <Description>SUSE Bug 1173334</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
