Network Time Protocol daemon (version 4)
The Network Time Protocol (NTP) is used to synchronize the time of a
computer client or server to another server or reference time source,
such as a radio, satellite receiver, or modem.
Ntpd is an operating system daemon that sets and maintains the system
time-of-day synchronized with Internet standard time servers.
- Developed at network:time
-
3
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory/ntp && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
MOD_NANO.diff | 0000000479 479 Bytes | |
NTP-FAQ-3.4.tar.bz2 | 0000271146 265 KB | |
README.SUSE | 0000000519 519 Bytes | |
bnc#506908.diff | 0000000391 391 Bytes | |
bnc#574885.diff | 0000000637 637 Bytes | |
conf.logrotate.ntp | 0000000187 187 Bytes | |
conf.ntp-wait.service | 0000000400 400 Bytes | |
conf.ntp.conf | 0000002964 2.89 KB | |
conf.ntp.reg | 0000000310 310 Bytes | |
conf.ntpd.service | 0000000410 410 Bytes | |
conf.start-ntpd | 0000006455 6.3 KB | |
conf.sysconfig.ntp | 0000001936 1.89 KB | |
conf.sysconfig.syslog-ntp | 0000000430 430 Bytes | |
ntp-4.2.6p2-ntpq-speedup-782060.patch | 0000000701 701 Bytes | |
ntp-4.2.6p2-seed_file.patch | 0000000577 577 Bytes | |
ntp-4.2.8p6.tar.gz | 0007152557 6.82 MB | |
ntp-segfault_on_invalid_device.patch | 0000000452 452 Bytes | |
ntp-strcat.patch | 0000000644 644 Bytes | |
ntp.NetworkManager | 0000000368 368 Bytes | |
ntp.changes | 0000067153 65.6 KB | |
ntp.firewall | 0000000343 343 Bytes | |
ntp.spec | 0000011346 11.1 KB | |
ntp.xml | 0000002906 2.84 KB | |
ntptime.8.gz | 0000000662 662 Bytes |
Revision 101 (latest revision is 139)
Dominique Leuenberger (dimstar_suse)
accepted
request 370038
from
Reinhard Max (rmax)
(revision 101)
- CVE-2015-8158, bsc#962966: potential infinite loop in ntpq - CVE-2015-8138, bsc#963002: Zero Origin Timestamp Bypass - CVE-2015-7978, bsc#963000: Stack exhaustion in recursive traversal of restriction list. - CVE-2015-7979, bsc#962784: off-path denial of service on authenticated broadcast mode - CVE-2015-7977, bsc#962970: restriction list NULL pointer dereference - CVE-2015-7976, bsc#962802: 'ntpq saveconfig' command allows dangerous characters in filenames - CVE-2015-7975, bsc#962988: nextvar() missing length check in ntpq - CVE-2015-7974, bsc#962960: Missing key check allows impersonation between authenticated peers - CVE-2015-7973, bsc#962995: replay attack on authenticated broadcast mode - CVE-2015-5300, bsc#951629: MITM attacker can force ntpd to make a step larger than the panic threshold - update to 4.2.8p6 * fixes low- and medium-severity vulnerabilities 4.2.8p6: CVE-2015-8158 CVE-2015-8138 CVE-2015-7978 CVE-2015-7979 CVE-2015-7977 CVE-2015-7976 CVE-2015-7975 CVE-2015-7974 CVE-2015-7973 4.2.8p5: CVE-2015-5300 * bug fixes ----------------------- --------------------------------------------
Comments 0