<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ntp</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:1423-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-05-27T10:09:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-05-27T10:09:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-05-27T10:09:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ntp</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for ntp fixes the following issues: 

- Update to 4.2.8p7 (boo#977446):
  * CVE-2016-1547, boo#977459:
    Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
  * CVE-2016-1548, boo#977461: Interleave-pivot
  * CVE-2016-1549, boo#977451:
    Sybil vulnerability: ephemeral association attack.
  * CVE-2016-1550, boo#977464: Improve NTP security against buffer
    comparison timing attacks.
  * CVE-2016-1551, boo#977450:
    Refclock impersonation vulnerability
  * CVE-2016-2516, boo#977452: Duplicate IPs on unconfig
    directives will cause an assertion botch in ntpd.
  * CVE-2016-2517, boo#977455: remote configuration trustedkey/
    requestkey/controlkey values are not properly validated.
  * CVE-2016-2518, boo#977457: Crafted addpeer with hmode &amp;gt; 7
    causes array wraparound with MATCH_ASSOC.
  * CVE-2016-2519, boo#977458: ctl_getitem() return value not
    always checked.
  * integrate ntp-fork.patch
  * Improve the fixes for:
    CVE-2015-7704, CVE-2015-7705, CVE-2015-7974
- Restrict the parser in the startup script to the first
  occurrance of &amp;quot;keys&amp;quot; and &amp;quot;controlkey&amp;quot; in ntp.conf (boo#957226).

- Enable compile-time support for MS-SNTP (--enable-ntp-signd).
  This replaces the w32 patches in 4.2.4 that added the authreg
  directive. (fate#320758).
- Fix ntp-sntp-dst.patch (boo#975496).
- Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
  When run as cron job, /usr/sbin/ is not in the path, which caused
  the synchronization to fail. (boo#962318)
- Speedup ntpq (boo#782060, ntp-speedup-ntpq.patch).
- Sync service files with openSUSE Factory.

- Fix the TZ offset output of sntp during DST (boo#951559).

- Add ntp-fork.patch and build with threads disabled to allow
  name resolution even when running chrooted.

- Update to 4.2.8p6:
  * CVE-2015-8158, boo#962966: Potential Infinite Loop in ntpq.
  * CVE-2015-8138, boo#963002: origin: Zero Origin Timestamp
    Bypass.
  * CVE-2015-7979, boo#962784: Off-path Denial of Service (DoS)
    attack on authenticated broadcast mode.
  * CVE-2015-7978, boo#963000: Stack exhaustion in recursive
    traversal of restriction list.
  * CVE-2015-7977, boo#962970: reslist NULL pointer dereference.
  * CVE-2015-7976, boo#962802: ntpq saveconfig command allows
    dangerous characters in filenames.
  * CVE-2015-7975, boo#962988: nextvar() missing length check.
  * CVE-2015-7974, boo#962960: Skeleton Key: Missing key check
    allows impersonation between authenticated peers.
  * CVE-2015-7973, boo#962995: Deja Vu: Replay attack on
    authenticated broadcast mode.
  * CVE-2015-8140: ntpq vulnerable to replay attacks.
  * CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin.
  * CVE-2015-5300, boo#951629: Small-step/Big-step.
- Add /var/db/ntp-kod (boo#916617).
- Add ntp-ENOBUFS.patch to limit a warning that might happen
  quite a lot on loaded systems (boo#956773).

- add ntp.bug2965.diff (boo#954982)
  * fixes regression in 4.2.8p4 update

- Update to 4.2.8p4 to fix several security issues (boo#951608):
  * CVE-2015-7871: NAK to the Future: Symmetric association
    authentication bypass via crypto-NAK
  * CVE-2015-7855: decodenetnum() will ASSERT botch instead of
    returning FAIL on some bogus values
  * CVE-2015-7854: Password Length Memory Corruption Vulnerability
  * CVE-2015-7853: Invalid length data provided by a custom
    refclock driver could cause a buffer overflow
  * CVE-2015-7852 ntpq atoascii() Memory Corruption Vulnerability
  * CVE-2015-7851 saveconfig Directory Traversal Vulnerability
  * CVE-2015-7850 remote config logfile-keyfile
  * CVE-2015-7849 trusted key use-after-free
  * CVE-2015-7848 mode 7 loop counter underrun
  * CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC
  * CVE-2015-7703 configuration directives &amp;quot;pidfile&amp;quot; and
    &amp;quot;driftfile&amp;quot; should only be allowed locally
  * CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should
    validate the origin timestamp field
  * CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete autokey
    data packet length checks
  * obsoletes ntp-memlock.patch.
- Add a controlkey line to /etc/ntp.conf if one does not already
  exist to allow runtime configuuration via ntpq.

- Temporarily disable memlock to avoid problems due to high memory
  usage during name resolution (boo#946386, ntp-memlock.patch).

- Use SHA1 instead of MD5 for symmetric keys (boo#905885).
- Improve runtime configuration:
  * Read keytype from ntp.conf
  * Don't write ntp keys to syslog.
- Fix legacy action scripts to pass on command line arguments.

- Remove ntp.1.gz, it wasn't installed anymore.
- Remove ntp-4.2.7-rh-manpages.tar.gz and only keep ntptime.8.gz.
  The rest is partially irrelevant, partially redundant and
  potentially outdated (boo#942587).
- Remove &amp;quot;kod&amp;quot; from the restrict line in ntp.conf (boo#944300).

- Use ntpq instead of deprecated ntpdc in start-ntpd (boo#936327).
- Add a controlkey to ntp.conf to make the above work.
- Don't let &amp;quot;keysdir&amp;quot; lines in ntp.conf trigger the &amp;quot;keys&amp;quot; parser.
- Disable mode 7 (ntpdc) again, now that we don't use it anymore.

- Add &amp;quot;addserver&amp;quot; as a new legacy action.
- Fix the comment regarding addserver in ntp.conf (boo#910063).

- Update to version 4.2.8p3 which incorporates all security fixes
  and most other patches we have so far (fate#319040).
  More information on:
  http://archive.ntp.org/ntp4/ChangeLog-stable
- Disable chroot by default (boo#926510).
- Enable ntpdc for backwards compatibility (boo#920238).

- Security fix: ntp-keygen may generate non-random symmetric keys
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:1423-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE 13.2">
      <Branch Type="Product Name" Name="openSUSE 13.2">
        <FullProductName ProductID="openSUSE 13.2">openSUSE 13.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ntp-4.2.8p7-25.15.1">
      <FullProductName ProductID="ntp-4.2.8p7-25.15.1">ntp-4.2.8p7-25.15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ntp-debuginfo-4.2.8p7-25.15.1">
      <FullProductName ProductID="ntp-debuginfo-4.2.8p7-25.15.1">ntp-debuginfo-4.2.8p7-25.15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ntp-debugsource-4.2.8p7-25.15.1">
      <FullProductName ProductID="ntp-debugsource-4.2.8p7-25.15.1">ntp-debugsource-4.2.8p7-25.15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ntp-doc-4.2.8p7-25.15.1">
      <FullProductName ProductID="ntp-doc-4.2.8p7-25.15.1">ntp-doc-4.2.8p7-25.15.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ntp-4.2.8p7-25.15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:ntp-4.2.8p7-25.15.1">ntp-4.2.8p7-25.15.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ntp-debuginfo-4.2.8p7-25.15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1">ntp-debuginfo-4.2.8p7-25.15.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ntp-debugsource-4.2.8p7-25.15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1">ntp-debugsource-4.2.8p7-25.15.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ntp-doc-4.2.8p7-25.15.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1">ntp-doc-4.2.8p7-25.15.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).</Note>
    </Notes>
    <CVE>CVE-2015-5300</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5300.html</URL>
        <Description>CVE-2015-5300</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951629</URL>
        <Description>SUSE Bug 951629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2015-7691</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7691.html</URL>
        <Description>CVE-2015-7691</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992991</URL>
        <Description>SUSE Bug 992991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2015-7692</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7692.html</URL>
        <Description>CVE-2015-7692</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992991</URL>
        <Description>SUSE Bug 992991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2015-7701</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7701.html</URL>
        <Description>CVE-2015-7701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992991</URL>
        <Description>SUSE Bug 992991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2015-7702</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7702.html</URL>
        <Description>CVE-2015-7702</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992991</URL>
        <Description>SUSE Bug 992991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.</Note>
    </Notes>
    <CVE>CVE-2015-7703</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7703.html</URL>
        <Description>CVE-2015-7703</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943216</URL>
        <Description>SUSE Bug 943216</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943218</URL>
        <Description>SUSE Bug 943218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943219</URL>
        <Description>SUSE Bug 943219</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943221</URL>
        <Description>SUSE Bug 943221</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2015-7704</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7704.html</URL>
        <Description>CVE-2015-7704</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952611</URL>
        <Description>SUSE Bug 952611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977446</URL>
        <Description>SUSE Bug 977446</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2015-7705</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7705.html</URL>
        <Description>CVE-2015-7705</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952611</URL>
        <Description>SUSE Bug 952611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.</Note>
    </Notes>
    <CVE>CVE-2015-7848</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7848.html</URL>
        <Description>CVE-2015-7848</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992991</URL>
        <Description>SUSE Bug 992991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2015-7849</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7849.html</URL>
        <Description>CVE-2015-7849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992991</URL>
        <Description>SUSE Bug 992991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2015-7850</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7850.html</URL>
        <Description>CVE-2015-7850</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992991</URL>
        <Description>SUSE Bug 992991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2015-7851</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7851.html</URL>
        <Description>CVE-2015-7851</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2015-7852</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7852.html</URL>
        <Description>CVE-2015-7852</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992991</URL>
        <Description>SUSE Bug 992991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2015-7853</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7853.html</URL>
        <Description>CVE-2015-7853</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992991</URL>
        <Description>SUSE Bug 992991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2015-7854</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7854.html</URL>
        <Description>CVE-2015-7854</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992991</URL>
        <Description>SUSE Bug 992991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2015-7855</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7855.html</URL>
        <Description>CVE-2015-7855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/992991</URL>
        <Description>SUSE Bug 992991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2015-7871</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7871.html</URL>
        <Description>CVE-2015-7871</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952606</URL>
        <Description>SUSE Bug 952606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.</Note>
    </Notes>
    <CVE>CVE-2015-7973</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7973.html</URL>
        <Description>CVE-2015-7973</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962995</URL>
        <Description>SUSE Bug 962995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975578</URL>
        <Description>SUSE Bug 975578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."</Note>
    </Notes>
    <CVE>CVE-2015-7974</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7974.html</URL>
        <Description>CVE-2015-7974</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962960</URL>
        <Description>SUSE Bug 962960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962995</URL>
        <Description>SUSE Bug 962995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975578</URL>
        <Description>SUSE Bug 975578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).</Note>
    </Notes>
    <CVE>CVE-2015-7975</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7975.html</URL>
        <Description>CVE-2015-7975</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962988</URL>
        <Description>SUSE Bug 962988</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962995</URL>
        <Description>SUSE Bug 962995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975578</URL>
        <Description>SUSE Bug 975578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.</Note>
    </Notes>
    <CVE>CVE-2015-7976</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7976.html</URL>
        <Description>CVE-2015-7976</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962802</URL>
        <Description>SUSE Bug 962802</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962995</URL>
        <Description>SUSE Bug 962995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975578</URL>
        <Description>SUSE Bug 975578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.</Note>
    </Notes>
    <CVE>CVE-2015-7977</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7977.html</URL>
        <Description>CVE-2015-7977</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962970</URL>
        <Description>SUSE Bug 962970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962995</URL>
        <Description>SUSE Bug 962995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975578</URL>
        <Description>SUSE Bug 975578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.</Note>
    </Notes>
    <CVE>CVE-2015-7978</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.8</BaseScore>
        <Vector>AV:N/AC:M/Au:M/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7978.html</URL>
        <Description>CVE-2015-7978</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962970</URL>
        <Description>SUSE Bug 962970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962995</URL>
        <Description>SUSE Bug 962995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963000</URL>
        <Description>SUSE Bug 963000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975578</URL>
        <Description>SUSE Bug 975578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.</Note>
    </Notes>
    <CVE>CVE-2015-7979</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7979.html</URL>
        <Description>CVE-2015-7979</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962784</URL>
        <Description>SUSE Bug 962784</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962995</URL>
        <Description>SUSE Bug 962995</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975578</URL>
        <Description>SUSE Bug 975578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977459</URL>
        <Description>SUSE Bug 977459</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982065</URL>
        <Description>SUSE Bug 982065</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.</Note>
    </Notes>
    <CVE>CVE-2015-8138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8138.html</URL>
        <Description>CVE-2015-8138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/951608</URL>
        <Description>SUSE Bug 951608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963002</URL>
        <Description>SUSE Bug 963002</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/974668</URL>
        <Description>SUSE Bug 974668</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975578</URL>
        <Description>SUSE Bug 975578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977446</URL>
        <Description>SUSE Bug 977446</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-8139</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8139.html</URL>
        <Description>CVE-2015-8139</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962997</URL>
        <Description>SUSE Bug 962997</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975578</URL>
        <Description>SUSE Bug 975578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.</Note>
    </Notes>
    <CVE>CVE-2015-8140</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8140.html</URL>
        <Description>CVE-2015-8140</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010964</URL>
        <Description>SUSE Bug 1010964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962994</URL>
        <Description>SUSE Bug 962994</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975578</URL>
        <Description>SUSE Bug 975578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.</Note>
    </Notes>
    <CVE>CVE-2015-8158</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8158.html</URL>
        <Description>CVE-2015-8158</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962966</URL>
        <Description>SUSE Bug 962966</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/975578</URL>
        <Description>SUSE Bug 975578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.</Note>
    </Notes>
    <CVE>CVE-2016-1547</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1547.html</URL>
        <Description>CVE-2016-1547</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962784</URL>
        <Description>SUSE Bug 962784</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977446</URL>
        <Description>SUSE Bug 977446</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977459</URL>
        <Description>SUSE Bug 977459</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982064</URL>
        <Description>SUSE Bug 982064</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982065</URL>
        <Description>SUSE Bug 982065</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-&gt;dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.</Note>
    </Notes>
    <CVE>CVE-2016-1548</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1548.html</URL>
        <Description>CVE-2016-1548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977446</URL>
        <Description>SUSE Bug 977446</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977461</URL>
        <Description>SUSE Bug 977461</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/982068</URL>
        <Description>SUSE Bug 982068</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.</Note>
    </Notes>
    <CVE>CVE-2016-1549</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.4</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1549.html</URL>
        <Description>CVE-2016-1549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977446</URL>
        <Description>SUSE Bug 977446</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977451</URL>
        <Description>SUSE Bug 977451</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.</Note>
    </Notes>
    <CVE>CVE-2016-1550</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1550.html</URL>
        <Description>CVE-2016-1550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977446</URL>
        <Description>SUSE Bug 977446</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977464</URL>
        <Description>SUSE Bug 977464</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock's peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.</Note>
    </Notes>
    <CVE>CVE-2016-1551</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.5</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1551.html</URL>
        <Description>CVE-2016-1551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977446</URL>
        <Description>SUSE Bug 977446</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977450</URL>
        <Description>SUSE Bug 977450</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.</Note>
    </Notes>
    <CVE>CVE-2016-2516</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.3</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2516.html</URL>
        <Description>CVE-2016-2516</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/0</URL>
        <Description>SUSE Bug 0</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977446</URL>
        <Description>SUSE Bug 977446</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977452</URL>
        <Description>SUSE Bug 977452</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey.  NOTE: this vulnerability exists because of a CVE-2016-2516 regression.</Note>
    </Notes>
    <CVE>CVE-2016-2517</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2517.html</URL>
        <Description>CVE-2016-2517</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/0</URL>
        <Description>SUSE Bug 0</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977446</URL>
        <Description>SUSE Bug 977446</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977455</URL>
        <Description>SUSE Bug 977455</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.</Note>
    </Notes>
    <CVE>CVE-2016-2518</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2518.html</URL>
        <Description>CVE-2016-2518</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977446</URL>
        <Description>SUSE Bug 977446</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977457</URL>
        <Description>SUSE Bug 977457</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.</Note>
    </Notes>
    <CVE>CVE-2016-2519</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:ntp-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debuginfo-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-debugsource-4.2.8p7-25.15.1</ProductID>
        <ProductID>openSUSE 13.2:ntp-doc-4.2.8p7-25.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2519.html</URL>
        <Description>CVE-2016-2519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/0</URL>
        <Description>SUSE Bug 0</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959243</URL>
        <Description>SUSE Bug 959243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977446</URL>
        <Description>SUSE Bug 977446</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977458</URL>
        <Description>SUSE Bug 977458</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
