Network Time Protocol daemon (version 4)

Edit Package ntp

The Network Time Protocol (NTP) is used to synchronize the time of a
computer client or server to another server or reference time source,
such as a radio, satellite receiver, or modem.

Ntpd is an operating system daemon that sets and maintains the system
time-of-day synchronized with Internet standard time servers.

Refresh
Refresh
Source Files
Filename Size Changed
MOD_NANO.diff 0000000479 479 Bytes
NTP-FAQ-3.4.tar.bz2 0000271146 265 KB
README.SUSE 0000000519 519 Bytes
bnc#506908.diff 0000000391 391 Bytes
bnc#574885.diff 0000000637 637 Bytes
conf.logrotate.ntp 0000000187 187 Bytes
conf.ntp-wait.service 0000000398 398 Bytes
conf.ntp.conf 0000002964 2.89 KB
conf.ntp.reg 0000000310 310 Bytes
conf.ntpd.service 0000000393 393 Bytes
conf.start-ntpd 0000006466 6.31 KB
conf.sysconfig.ntp 0000001937 1.89 KB
conf.sysconfig.syslog-ntp 0000000430 430 Bytes
ntp-4.2.6p2-ntpq-speedup-782060.patch 0000000701 701 Bytes
ntp-4.2.6p2-seed_file.patch 0000000577 577 Bytes
ntp-4.2.8p10.tar.gz 0006998648 6.67 MB
ntp-ENOBUFS.patch 0000000691 691 Bytes
ntp-daemonize.patch 0000001909 1.86 KB
ntp-move-kod-file.patch 0000004008 3.91 KB
ntp-pathfind.patch 0000000794 794 Bytes
ntp-segfault_on_invalid_device.patch 0000000452 452 Bytes
ntp-sntp-a.patch 0000000586 586 Bytes
ntp-sntp-dst.patch 0000001743 1.7 KB
ntp-strcat.patch 0000000644 644 Bytes
ntp-usrgrp-resolver.patch 0000010124 9.89 KB
ntp-warnings.patch 0000001982 1.94 KB
ntp.NetworkManager 0000000368 368 Bytes
ntp.changes 0000074853 73.1 KB
ntp.firewall 0000000343 343 Bytes
ntp.spec 0000011852 11.6 KB
ntp.xml 0000002906 2.84 KB
ntptime.8.gz 0000000662 662 Bytes
Revision 110 (latest revision is 139)
Yuchen Lin's avatar Yuchen Lin (maxlin_factory) accepted request 486156 from Reinhard Max's avatar Reinhard Max (rmax) (revision 110)
- Enable experimental leap smearing (fate#321003).
  See /usr/share/doc/packages/ntp/README.leapsmear for details.

- Fix spelling and default values in conf.sysconfig.ntp

- Update to 4.2.8p10 (bsc#1030050):
  * Sec 3389 / CVE-2017-6464 / VU#325339: NTP-01-016 NTP:
    Denial of Service via Malformed Config
  * Sec 3388 / CVE-2017-6462 / VU#325339: NTP-01-014 NTP:
    Buffer Overflow in DPTS Clock
  * Sec 3387 / CVE-2017-6463 / VU#325339: NTP-01-012 NTP:
    Authenticated DoS via Malicious Config Option
  * Sec 3386: NTP-01-011 NTP:
    ntpq_stripquotes() returns incorrect Value
  * Sec 3385: NTP-01-010 NTP:
    ereallocarray()/eallocarray() underused
  * Sec 3381: NTP-01-006 NTP: Copious amounts of Unused Code
  * Sec 3380: NTP-01-005 NTP: Off-by-one in Oncore GPS Receiver
  * Sec 3379 / CVE-2017-6458 / VU#325339: NTP-01-004 NTP:
    Potential Overflows in ctl_put() functions
  * Sec 3378 / CVE-2017-6451 / VU#325339: NTP-01-003
    Improper use of snprintf() in mx4200_send()
  * Sec 3377 / CVE-2017-6460 / VU#325339: NTP-01-002
    Buffer Overflow in ntpq when fetching reslist
  * Sec 3376: NTP-01-001 Makefile does not enforce Security Flags
  * Sec 3361 / CVE-2016-9042 / VU#325339: 0rigin (zero origin) DoS.
  * [Bug 3393] clang scan-build findings
  * [Bug 3363] Support for openssl-1.1.0 without compatibility modes
  * [Bug 3356] Bugfix 3072 breaks multicastclient
  * [Bug 3173] forking async worker: interrupted pipe I/O
Comments 0
openSUSE Build Service is sponsored by