Product:

Ubuntu_linux

(Canonical)
Repositories https://github.com/torvalds/linux
https://github.com/LibRaw/LibRaw
https://github.com/neomutt/neomutt
https://github.com/ImageMagick/ImageMagick
https://github.com/xkbcommon/libxkbcommon
https://github.com/FreeRDP/FreeRDP
https://github.com/kyz/libmspack
https://github.com/gpac/gpac
https://github.com/dbry/WavPack
https://github.com/curl/curl
https://github.com/file/file
https://github.com/audreyt/module-signature
https://github.com/LibVNC/libvncserver
https://github.com/rubygems/rubygems
https://github.com/Perl/perl5
https://github.com/libarchive/libarchive
https://github.com/tats/w3m
https://github.com/openvswitch/ovs
https://github.com/ntp-project/ntp
https://github.com/apache/httpd
https://github.com/newsoft/libvncserver
https://github.com/dosfstools/dosfstools
https://github.com/memcached/memcached
https://github.com/WebKit/webkit
https://github.com/libgd/libgd
https://github.com/lxc/lxcfs
https://github.com/bagder/curl
https://github.com/vrtadmin/clamav-devel
https://github.com/git/git
https://github.com/mysql/mysql-server
https://github.com/GNOME/pango
https://github.com/openssh/openssh-portable
https://github.com/dovecot/core
https://git.kernel.org/pub/scm/git/git.git
https://github.com/openstack/nova-lxd
https://github.com/apple/cups
https://github.com/beanshell/beanshell
https://github.com/php/php-src
https://github.com/derickr/timelib
https://github.com/glennrp/libpng
https://github.com/openbsd/src
https://git.savannah.gnu.org/git/patch.git
https://github.com/requests/requests
https://github.com/puppetlabs/puppet
https://github.com/lxc/lxc
https://github.com/flori/json
https://github.com/libjpeg-turbo/libjpeg-turbo
https://github.com/simsong/tcpflow
https://github.com/qpdf/qpdf
https://github.com/lxml/lxml
https://github.com/TeX-Live/texlive-source
https://github.com/liblouis/liblouis
https://github.com/ImageMagick/ImageMagick6
https://github.com/mm2/Little-CMS
https://github.com/lavv17/lftp
https://github.com/Cisco-Talos/clamav-devel
https://github.com/moinwiki/moin-1.9
https://github.com/pyca/cryptography
https://github.com/libimobiledevice/libimobiledevice
https://github.com/jpirko/libndp
https://github.com/wikimedia/mediawiki
https://github.com/kohler/t1utils
https://github.com/kennethreitz/requests
https://github.com/khaledhosny/ots
https://github.com/jmacd/xdelta-devel
https://github.com/quassel/quassel
https://github.com/hexchat/hexchat
https://github.com/mongodb/mongo-python-driver
https://github.com/openstack/glance
https://github.com/openstack/nova
#Vulnerabilities 2396
Date ID Summary Products Score Patch
2020-03-12 CVE-2020-0556 Improper access control in subsystem for BlueZ before version 5.54 may allow an unauthenticated user to potentially enable escalation of privilege and denial of service via adjacent access Bluez, Ubuntu_linux, Debian_linux, Leap N/A
2020-06-15 CVE-2020-0543 Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Ubuntu_linux, Fedora, Celeron_1000m, Celeron_1005m, Celeron_1007u, Celeron_1017u, Celeron_1019y, Celeron_1020e, Celeron_1020m, Celeron_1037u, Celeron_1047ue, Celeron_2955u, Celeron_2957u, Celeron_2970m, Celeron_2980u, Celeron_2981u, Celeron_3755u, Celeron_3765u, Celeron_3855u, Celeron_3865u, Celeron_3955u, Celeron_3965u, Celeron_3965y, Celeron_5305u, Celeron_725c, Celeron_927ue, Celeron_g1610, Celeron_g1610t, Celeron_g1620, Celeron_g1620t, Celeron_g1630, Celeron_g1820, Celeron_g1820t, Celeron_g1830, Celeron_g1840, Celeron_g1840t, Celeron_g1850, Celeron_g3900, Celeron_g3900t, Celeron_g3900te, Celeron_g3902e, Celeron_g3920, Celeron_g3920t, Celeron_g3930e, Celeron_g3930te, Celeron_g3940, Celeron_g4900, Celeron_g4900t, Celeron_g4920, Celeron_g4930, Celeron_g4950, Core_4205u, Core_4410y, Core_4415y, Core_5405u, Core_8269u, Core_9300h, Core_9750hf, Core_i3\-2115c, Core_i3\-3110m, Core_i3\-3115c, Core_i3\-3120m, Core_i3\-3120me, Core_i3\-3130m, Core_i3\-3210, Core_i3\-3217u, Core_i3\-3217ue, Core_i3\-3220, Core_i3\-3220t, Core_i3\-3225, Core_i3\-3227u, Core_i3\-3229y, Core_i3\-3240, Core_i3\-3240t, Core_i3\-3245, Core_i3\-3250, Core_i3\-3250t, Core_i3\-4005u, Core_i3\-4010u, Core_i3\-4010y, Core_i3\-4012y, Core_i3\-4020y, Core_i3\-4025u, Core_i3\-4030u, Core_i3\-4030y, Core_i3\-4100m, Core_i3\-4100u, Core_i3\-4110m, Core_i3\-4120u, Core_i3\-4130, Core_i3\-4130t, Core_i3\-4150, Core_i3\-4150t, Core_i3\-4158u, Core_i3\-4160, Core_i3\-4160t, Core_i3\-4170, Core_i3\-4170t, Core_i3\-4330, Core_i3\-4330t, Core_i3\-4340, Core_i3\-4350, Core_i3\-4350t, Core_i3\-4360, Core_i3\-4360t, Core_i3\-4370, Core_i3\-4370t, Core_i3\-5005u, Core_i3\-5006u, Core_i3\-5010u, Core_i3\-5015u, Core_i3\-5020u, Core_i3\-5157u, Core_i3\-6100, Core_i3\-6100e, Core_i3\-6100h, Core_i3\-6100t, Core_i3\-6100te, Core_i3\-6100u, Core_i3\-6102e, Core_i3\-6110u, Core_i3\-6120, Core_i3\-6120t, Core_i3\-6167u, Core_i3\-6300, Core_i3\-6300t, Core_i3\-6320, Core_i3\-6320t, Core_i3\-7007u, Core_i3\-7020u, Core_i3\-7100e, Core_i3\-7100h, Core_i3\-7100u, Core_i3\-7101e, Core_i3\-7101te, Core_i3\-7102e, Core_i3\-7110u, Core_i3\-7120, Core_i3\-7120t, Core_i3\-7130u, Core_i3\-7167u, Core_i3\-7320t, Core_i3\-7340, Core_i3\-8000, Core_i3\-8000t, Core_i3\-8020, Core_i3\-8100, Core_i3\-8100h, Core_i3\-8100t, Core_i3\-8109u, Core_i3\-8120, Core_i3\-8130u, Core_i3\-8145u, Core_i3\-8300, Core_i3\-8300t, Core_i3\-8350k, Core_i3\-I3\-8100h, Core_i5\-10110y, Core_i5\-10210u, Core_i5\-10210y, Core_i5\-10310y, Core_i5\-3210m, Core_i5\-3230m, Core_i5\-3317u, Core_i5\-3320m, Core_i5\-3330, Core_i5\-3330s, Core_i5\-3337u, Core_i5\-3339y, Core_i5\-3340, Core_i5\-3340m, Core_i5\-3340s, Core_i5\-3350p, Core_i5\-3360m, Core_i5\-3380m, Core_i5\-3427u, Core_i5\-3437u, Core_i5\-3439y, Core_i5\-3450, Core_i5\-3450s, Core_i5\-3470, Core_i5\-3470s, Core_i5\-3470t, Core_i5\-3475s, Core_i5\-3550, Core_i5\-3550s, Core_i5\-3570, Core_i5\-3570k, Core_i5\-3570s, Core_i5\-3570t, Core_i5\-3610me, Core_i5\-4200u, Core_i5\-4200y, Core_i5\-4202y, Core_i5\-4210h, Core_i5\-4210u, Core_i5\-4210y, Core_i5\-4220y, Core_i5\-4250u, Core_i5\-4258u, Core_i5\-4260u, Core_i5\-4278u, Core_i5\-4288u, Core_i5\-4300u, Core_i5\-4300y, Core_i5\-4302y, Core_i5\-4308u, Core_i5\-4350u, Core_i5\-4402ec, Core_i5\-4430, Core_i5\-4430s, Core_i5\-4440, Core_i5\-4440s, Core_i5\-4460, Core_i5\-4460s, Core_i5\-4460t, Core_i5\-4570, Core_i5\-4570r, Core_i5\-4570s, Core_i5\-4570t, Core_i5\-4590, Core_i5\-4590s, Core_i5\-4590t, Core_i5\-4670, Core_i5\-4670k, Core_i5\-4670r, Core_i5\-4670s, Core_i5\-4670t, Core_i5\-4690, Core_i5\-4690s, Core_i5\-4690t, Core_i5\-5200u, Core_i5\-5250u, Core_i5\-5257u, Core_i5\-5287u, Core_i5\-5350, Core_i5\-5350u, Core_i5\-5575r, Core_i5\-5675c, Core_i5\-5675r, Core_i5\-6200u, Core_i5\-6210u, Core_i5\-6260u, Core_i5\-6267u, Core_i5\-6287u, Core_i5\-6300hq, Core_i5\-6300u, Core_i5\-6310u, Core_i5\-6350hq, Core_i5\-6360u, Core_i5\-6400, Core_i5\-6400t, Core_i5\-6440eq, Core_i5\-6440hq, Core_i5\-6442eq, Core_i5\-6500, Core_i5\-6500t, Core_i5\-6500te, Core_i5\-6600, Core_i5\-6600k, Core_i5\-6600t, Core_i5\-7200u, Core_i5\-7210u, Core_i5\-7260u, Core_i5\-7267u, Core_i5\-7287u, Core_i5\-7300hq, Core_i5\-7300u, Core_i5\-7360u, Core_i5\-7400, Core_i5\-7400t, Core_i5\-7440eq, Core_i5\-7440hq, Core_i5\-7442eq, Core_i5\-7500, Core_i5\-7500t, Core_i5\-7500u, Core_i5\-7600, Core_i5\-7600k, Core_i5\-7600t, Core_i5\-7640x, Core_i5\-7y54, Core_i5\-7y57_, Core_i5\-8200y, Core_i5\-8210y, Core_i5\-8250u, Core_i5\-8259u, Core_i5\-8265u, Core_i5\-8300h, Core_i5\-8305g, Core_i5\-8310y, Core_i5\-8350u, Core_i5\-8365u, Core_i5\-8400, Core_i5\-8400b, Core_i5\-8400h, Core_i5\-8400t, Core_i5\-8420, Core_i5\-8420t, Core_i5\-8500, Core_i5\-8500b, Core_i5\-8500t, Core_i5\-8550, Core_i5\-8600, Core_i5\-8600k, Core_i5\-8600t, Core_i5\-8650, Core_i5\-8650k, Core_i5\-9400, Core_i5\-9400f, Core_i5\-9400h, Core_i5\-9600k, Core_i5\-9600kf, Core_i7\-10510u, Core_i7\-10510y, Core_i7\-3517u, Core_i7\-3517ue, Core_i7\-3520m, Core_i7\-3537u, Core_i7\-3540m, Core_i7\-3555le, Core_i7\-3610qe, Core_i7\-3610qm, Core_i7\-3612qe, Core_i7\-3612qm, Core_i7\-3615qe, Core_i7\-3615qm, Core_i7\-3630qm, Core_i7\-3632qm, Core_i7\-3635qm, Core_i7\-3667u, Core_i7\-3687u, Core_i7\-3689y, Core_i7\-3720qm, Core_i7\-3740qm, Core_i7\-3770, Core_i7\-3770k, Core_i7\-3770s, Core_i7\-3770t, Core_i7\-3820qm, Core_i7\-3840qm_, Core_i7\-3920xm, Core_i7\-3940xm, Core_i7\-4500u, Core_i7\-4510u, Core_i7\-4550u, Core_i7\-4558u, Core_i7\-4578u, Core_i7\-4600u, Core_i7\-4610y, Core_i7\-4650u, Core_i7\-4700ec, Core_i7\-4700eq, Core_i7\-4700hq, Core_i7\-4700mq, Core_i7\-4702ec, Core_i7\-4702hq, Core_i7\-4702mq, Core_i7\-4710hq, Core_i7\-4710mq, Core_i7\-4712hq, Core_i7\-4712mq, Core_i7\-4720hq, Core_i7\-4722hq, Core_i7\-4750hq, Core_i7\-4760hq, Core_i7\-4765t, Core_i7\-4770, Core_i7\-4770hq, Core_i7\-4770k, Core_i7\-4770r, Core_i7\-4770s, Core_i7\-4770t, Core_i7\-4771, Core_i7\-4785t, Core_i7\-4790, Core_i7\-4790s, Core_i7\-4790t, Core_i7\-4800mq, Core_i7\-4810mq, Core_i7\-4850hq, Core_i7\-4860hq, Core_i7\-4870hq, Core_i7\-4900mq, Core_i7\-4910mq, Core_i7\-4950hq, Core_i7\-4960hq, Core_i7\-4980hq, Core_i7\-5500u, Core_i7\-5550u, Core_i7\-5557u, Core_i7\-5600u, Core_i7\-5650u, Core_i7\-5700eq, Core_i7\-5700hq, Core_i7\-5750hq, Core_i7\-5775c, Core_i7\-5775r, Core_i7\-5850eq, Core_i7\-5850hq, Core_i7\-5950hq, Core_i7\-6500u, Core_i7\-6510u, Core_i7\-6560u, Core_i7\-6567u, Core_i7\-6600u, Core_i7\-6650u, Core_i7\-6660u, Core_i7\-6700, Core_i7\-6700hq, Core_i7\-6700k, Core_i7\-6700t, Core_i7\-6700te, Core_i7\-6770hq, Core_i7\-6820eq, Core_i7\-6820hk, Core_i7\-6820hq, Core_i7\-6822eq, Core_i7\-6870hq, Core_i7\-6920hq, Core_i7\-6970hq, Core_i7\-7500u, Core_i7\-7510u, Core_i7\-7560u, Core_i7\-7567u, Core_i7\-7600u, Core_i7\-7660u, Core_i7\-7700, Core_i7\-7700hq, Core_i7\-7700k, Core_i7\-7700t, Core_i7\-7740x, Core_i7\-7820eq, Core_i7\-7820hk, Core_i7\-7820hq, Core_i7\-7920hq, Core_i7\-7y75, Core_i7\-8500y, Core_i7\-8510y, Core_i7\-8550u, Core_i7\-8557u, Core_i7\-8559u, Core_i7\-8560u, Core_i7\-8565u, Core_i7\-8569u, Core_i7\-8650u, Core_i7\-8665u, Core_i7\-8670, Core_i7\-8670t, Core_i7\-8700, Core_i7\-8700b, Core_i7\-8700k, Core_i7\-8700t, Core_i7\-8705g, Core_i7\-8706g, Core_i7\-8709g, Core_i7\-8750h, Core_i7\-8809g, Core_i7\-8850h, Core_i7\-9700k, Core_i7\-9700kf, Core_i7\-9850h, Core_i9\-8950hk, Core_i9\-9880h, Core_i9\-9900k, Core_i9\-9900kf, Core_i9\-9980hk, Core_m3\-6y30, Core_m3\-7y30, Core_m3\-8100y, Core_m5\-6y54, Core_m5\-6y57, Core_m7\-6y75, Core_m\-5y10, Core_m\-5y10a, Core_m\-5y10c, Core_m\-5y3, Core_m\-5y51, Core_m\-5y70, Core_m\-5y71, Pentium_1405_v2, Pentium_2020m_v2, Pentium_2030m_v2, Pentium_2117u_v2, Pentium_2127u_v2, Pentium_2129y_v2, Pentium_3205u, Pentium_3215u, Pentium_3556u, Pentium_3558u, Pentium_3560m, Pentium_3560y, Pentium_3561y, Pentium_3665u, Pentium_3765u, Pentium_3805u, Pentium_3825u, Pentium_4405u, Pentium_4405y, Pentium_4415u, Pentium_a1018_v2, Pentium_b915c, Pentium_b925c, Pentium_g2010_v2, Pentium_g2020_v2, Pentium_g2020t_v2, Pentium_g2030_v2, Pentium_g2030t_v2, Pentium_g2100t_v2, Pentium_g2120_v2, Pentium_g2120t_v2, Pentium_g2130_v2, Pentium_g2140_v2, Pentium_g3220, Pentium_g3220t, Pentium_g3240, Pentium_g3240t, Pentium_g3250, Pentium_g3250t, Pentium_g3258, Pentium_g3260, Pentium_g3260t, Pentium_g3420, Pentium_g3420t, Pentium_g3430, Pentium_g3440, Pentium_g3440t, Pentium_g3450, Pentium_g3450t, Pentium_g3460, Pentium_g3460t, Pentium_g3470, Pentium_g4400, Pentium_g4400t, Pentium_g4400te, Pentium_g4420, Pentium_g4420t, Pentium_g4500, Pentium_g4500t, Pentium_g4520, Pentium_g4520t, Pentium_g4540, Pentium_g5400, Pentium_g5400t, Pentium_g5420, Pentium_g5420t, Pentium_g5500, Pentium_g5500t, Pentium_g5600, Pentium_gold_6405u, Xeon_e3\-1105c, Xeon_e3\-1105c_v2, Xeon_e3\-1125c, Xeon_e3\-1125c_v2, Xeon_e3\-1220_v2, Xeon_e3\-1220_v3, Xeon_e3\-1220_v5, Xeon_e3\-1220_v6, Xeon_e3\-1220l_v2, Xeon_e3\-1220l_v3, Xeon_e3\-1221_v3, Xeon_e3\-1225_v2, Xeon_e3\-1225_v3, Xeon_e3\-1225_v5, Xeon_e3\-1225_v6, Xeon_e3\-1226_v3, Xeon_e3\-1230_v2, Xeon_e3\-1230_v3, Xeon_e3\-1230_v5, Xeon_e3\-1230_v6, Xeon_e3\-1230l_v3, Xeon_e3\-1231_v3, Xeon_e3\-1235_v2, Xeon_e3\-1235l_v5, Xeon_e3\-1240_v2, Xeon_e3\-1240_v3, Xeon_e3\-1240_v5, Xeon_e3\-1240_v6, Xeon_e3\-1240l_v3, Xeon_e3\-1240l_v5, Xeon_e3\-1241_v3, Xeon_e3\-1245_v2, Xeon_e3\-1245_v3, Xeon_e3\-1245_v5, Xeon_e3\-1245_v6, Xeon_e3\-1246_v3, Xeon_e3\-1258l_v4, Xeon_e3\-1260l_v5, Xeon_e3\-1265l, Xeon_e3\-1265l_v2, Xeon_e3\-1265l_v4, Xeon_e3\-1268l_v3, Xeon_e3\-1268l_v5, Xeon_e3\-1270, Xeon_e3\-1270_v2, Xeon_e3\-1270_v5, Xeon_e3\-1270_v6, Xeon_e3\-1271_v3, Xeon_e3\-1275_v2, Xeon_e3\-1275_v3, Xeon_e3\-1275_v5, Xeon_e3\-1275_v6, Xeon_e3\-1275l_v3, Xeon_e3\-1276_v3, Xeon_e3\-1278l_v4, Xeon_e3\-1280_v2, Xeon_e3\-1280_v3, Xeon_e3\-1280_v5, Xeon_e3\-1280_v6, Xeon_e3\-1281_v3, Xeon_e3\-1285_v3, Xeon_e3\-1285_v4, Xeon_e3\-1285_v6, Xeon_e3\-1285l_v3, Xeon_e3\-1286_v3, Xeon_e3\-1286l_v3, Xeon_e3\-1290_v2, Xeon_e3\-1501l_v6, Xeon_e3\-1501m_v6, Xeon_e3\-1505l_v5, Xeon_e3\-1505l_v6, Xeon_e3\-1505m_v5, Xeon_e3\-1505m_v6, Xeon_e3\-1515m_v5, Xeon_e3\-1535m_v5, Xeon_e3\-1535m_v6, Xeon_e3\-1545m_v5, Xeon_e3\-1558l_v5, Xeon_e3\-1565l_v5, Xeon_e3\-1575m_v5, Xeon_e3\-1578l_v5, Xeon_e3\-1585_v5, Xeon_e3\-1585l_v5, Xeon_e\-2124, Xeon_e\-2124g, Xeon_e\-2126g, Xeon_e\-2134, Xeon_e\-2136, Xeon_e\-2144g, Xeon_e\-2146g, Xeon_e\-2174g, Xeon_e\-2176g, Xeon_e\-2176m, Xeon_e\-2184g, Xeon_e\-2186g, Xeon_e\-2186m, Xeon_e\-2224, Xeon_e\-2224g, Xeon_e\-2226g, Xeon_e\-2226ge, Xeon_e\-2234, Xeon_e\-2236, Xeon_e\-2244g, Xeon_e\-2246g, Xeon_e\-2254me, Xeon_e\-2254ml, Xeon_e\-2274g, Xeon_e\-2276g, Xeon_e\-2276m, Xeon_e\-2276me, Xeon_e\-2276ml, Xeon_e\-2278g, Xeon_e\-2278ge, Xeon_e\-2278gel, Xeon_e\-2284g, Xeon_e\-2286m, Xeon_e\-2288g, Leap N/A
2020-01-08 CVE-2019-17023 After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored. This vulnerability affects Firefox < 72. Ubuntu_linux, Firefox N/A
2020-05-12 CVE-2020-12826 A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process... Ubuntu_linux, Linux_kernel, Enterprise_linux, Enterprise_mrg N/A
2020-06-04 CVE-2020-13777 GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application. Ubuntu_linux, Debian_linux, Fedora, Gnutls N/A
2019-06-19 CVE-2019-11479 Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363. Ubuntu_linux, Big\-Ip_access_policy_manager, Big\-Ip_advanced_firewall_manager, Big\-Ip_analytics, Big\-Ip_application_acceleration_manager, Big\-Ip_application_security_manager, Big\-Ip_domain_name_system, Big\-Ip_edge_gateway, Big\-Ip_fraud_protection_service, Big\-Ip_global_traffic_manager, Big\-Ip_link_controller, Big\-Ip_local_traffic_manager, Big\-Ip_policy_enforcement_manager, Big\-Ip_webaccelerator, Linux_kernel, Pulse_connect_secure, Pulse_policy_secure, Pulse_secure_virtual_application_delivery_controller, Enterprise_linux, Enterprise_linux_atomic_host, Enterprise_linux_aus, Enterprise_linux_eus, Enterprise_mrg, Virtualization 7.5
2020-06-03 CVE-2020-13254 An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage. Ubuntu_linux, Django N/A
2019-12-23 CVE-2019-17563 When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability. Tomcat, Ubuntu_linux, Debian_linux, Leap N/A
2018-03-06 CVE-2018-7185 The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association. Ubuntu_linux, Hpux\-Ntp, Hci, Solidfire, Ntp, Fujitsu_m10\-1_firmware, Fujitsu_m10\-4_firmware, Fujitsu_m10\-4s_firmware, Fujitsu_m12\-1_firmware, Fujitsu_m12\-2_firmware, Fujitsu_m12\-2s_firmware, Diskstation_manager, Router_manager, Skynas, Virtual_diskstation_manager, Vs960hd_firmware N/A
2017-01-13 CVE-2016-7426 NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address. Ubuntu_linux, Hpux\-Ntp, Ntp, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_eus, Enterprise_linux_server_tus, Enterprise_linux_workstation N/A