Network Time Protocol daemon (version 4)

Edit Package ntp

The Network Time Protocol (NTP) is used to synchronize the time of a
computer client or server to another server or reference time source,
such as a radio, satellite receiver, or modem.

Ntpd is an operating system daemon that sets and maintains the system
time-of-day synchronized with Internet standard time servers.

Refresh
Refresh
Source Files
Filename Size Changed
MOD_NANO.diff 0000000479 479 Bytes
NTP-FAQ-3.4.tar.bz2 0000271146 265 KB
README.SUSE 0000000519 519 Bytes
bnc#506908.diff 0000000391 391 Bytes
bnc#574885.diff 0000000637 637 Bytes
conf.logrotate.ntp 0000000187 187 Bytes
conf.ntp-wait.service 0000000400 400 Bytes
conf.ntp.conf 0000002964 2.89 KB
conf.ntp.reg 0000000310 310 Bytes
conf.ntpd.service 0000000410 410 Bytes
conf.start-ntpd 0000006455 6.3 KB
conf.sysconfig.ntp 0000001936 1.89 KB
conf.sysconfig.syslog-ntp 0000000430 430 Bytes
ntp-4.2.6p2-ntpq-speedup-782060.patch 0000000701 701 Bytes
ntp-4.2.6p2-seed_file.patch 0000000577 577 Bytes
ntp-4.2.8p6.tar.gz 0007152557 6.82 MB
ntp-segfault_on_invalid_device.patch 0000000452 452 Bytes
ntp-strcat.patch 0000000644 644 Bytes
ntp.NetworkManager 0000000368 368 Bytes
ntp.changes 0000067153 65.6 KB
ntp.firewall 0000000343 343 Bytes
ntp.spec 0000011346 11.1 KB
ntp.xml 0000002906 2.84 KB
ntptime.8.gz 0000000662 662 Bytes
Revision 101 (latest revision is 139)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 370038 from Reinhard Max's avatar Reinhard Max (rmax) (revision 101)
- CVE-2015-8158, bsc#962966: potential infinite loop in ntpq
- CVE-2015-8138, bsc#963002: Zero Origin Timestamp Bypass
- CVE-2015-7978, bsc#963000: Stack exhaustion in recursive
  traversal of restriction list.
- CVE-2015-7979, bsc#962784: off-path denial of service on
  authenticated broadcast mode
- CVE-2015-7977, bsc#962970: restriction list NULL pointer
  dereference
- CVE-2015-7976, bsc#962802: 'ntpq saveconfig' command allows
  dangerous characters in filenames
- CVE-2015-7975, bsc#962988: nextvar() missing length check in ntpq
- CVE-2015-7974, bsc#962960: Missing key check allows impersonation
  between authenticated peers
- CVE-2015-7973, bsc#962995: replay attack on authenticated
  broadcast mode
- CVE-2015-5300, bsc#951629: MITM attacker can force ntpd to make
  a step larger than the panic threshold

- update to 4.2.8p6
  * fixes low- and medium-severity vulnerabilities
    4.2.8p6: CVE-2015-8158 CVE-2015-8138 CVE-2015-7978
    CVE-2015-7979 CVE-2015-7977 CVE-2015-7976 CVE-2015-7975
    CVE-2015-7974 CVE-2015-7973
    4.2.8p5: CVE-2015-5300
  * bug fixes
----------------------- --------------------------------------------
Comments 0
openSUSE Build Service is sponsored by