The Network Time Protocol (NTP) update for security issues, bug fixes, and enhancement
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | (RHSA-2015:1459) Moderate: ntp security, bug fix, and enhancement update | 22 Jul 201500:00 | – | redhat |
![]() | RedHat Update for ntp RHSA-2015:2231-04 | 20 Nov 201500:00 | – | openvas |
![]() | RedHat Update for ntp RHSA-2015:1459-01 | 23 Jul 201500:00 | – | openvas |
![]() | Oracle: Security Advisory (ELSA-2015-1459) | 6 Oct 201500:00 | – | openvas |
![]() | Debian: Security Advisory (DLA-149-1) | 8 Mar 202300:00 | – | openvas |
![]() | Oracle: Security Advisory (ELSA-2015-2231) | 24 Nov 201500:00 | – | openvas |
![]() | Debian: Security Advisory (DLA-192-1) | 8 Mar 202300:00 | – | openvas |
![]() | SUSE: Security Advisory (SUSE-SU-2015:0865-1) | 19 Apr 202100:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-3223-1) | 11 Apr 201500:00 | – | openvas |
![]() | Fedora Update for ntp FEDORA-2015-5830 | 29 Apr 201500:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | noarch | ntp-perl | 4.2.6p5-22.el7 | ntp-perl-4.2.6p5-22.el7.noarch.rpm |
RedHat | 7 | x86_64 | ntp-debuginfo | 4.2.6p5-22.el7 | ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm |
RedHat | 7 | s390x | ntp | 4.2.6p5-22.el7 | ntp-4.2.6p5-22.el7.s390x.rpm |
RedHat | 7 | x86_64 | sntp | 4.2.6p5-22.el7 | sntp-4.2.6p5-22.el7.x86_64.rpm |
RedHat | 7 | aarch64 | sntp | 4.2.6p5-22.el7 | sntp-4.2.6p5-22.el7.aarch64.rpm |
RedHat | 7 | src | ntp | 4.2.6p5-22.el7 | ntp-4.2.6p5-22.el7.src.rpm |
RedHat | 7 | s390x | sntp | 4.2.6p5-22.el7 | sntp-4.2.6p5-22.el7.s390x.rpm |
RedHat | 7 | s390x | ntp-debuginfo | 4.2.6p5-22.el7 | ntp-debuginfo-4.2.6p5-22.el7.s390x.rpm |
RedHat | 7 | aarch64 | ntp-debuginfo | 4.2.6p5-22.el7 | ntp-debuginfo-4.2.6p5-22.el7.aarch64.rpm |
RedHat | 7 | s390x | ntpdate | 4.2.6p5-22.el7 | ntpdate-4.2.6p5-22.el7.s390x.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo