Network Time Protocol daemon (version 4)

Edit Package ntp

The Network Time Protocol (NTP) is used to synchronize the time of a
computer client or server to another server or reference time source,
such as a radio, satellite receiver, or modem.

Ntpd is an operating system daemon that sets and maintains the system
time-of-day synchronized with Internet standard time servers.

Refresh
Refresh
Source Files
Filename Size Changed
MOD_NANO.diff 0000000479 479 Bytes
NTP-FAQ-3.4.tar.bz2 0000271146 265 KB
README.SUSE 0000000519 519 Bytes
bnc#506908.diff 0000000391 391 Bytes
bnc#574885.diff 0000000637 637 Bytes
conf.logrotate.ntp 0000000187 187 Bytes
conf.ntp-wait.service 0000000398 398 Bytes
conf.ntp.conf 0000002977 2.91 KB
conf.ntp.reg 0000000310 310 Bytes
conf.ntpd.service 0000000457 457 Bytes
conf.start-ntpd 0000005594 5.46 KB
conf.sysconfig.ntp 0000001937 1.89 KB
conf.sysconfig.syslog-ntp 0000000430 430 Bytes
ntp-4.2.6p2-seed_file.patch 0000000558 558 Bytes
ntp-4.2.8p15.tar.gz 0007015970 6.69 MB
ntp-ENOBUFS.patch 0000000691 691 Bytes
ntp-move-kod-file.patch 0000004008 3.91 KB
ntp-openssl-version.patch 0000000500 500 Bytes
ntp-pathfind.patch 0000000794 794 Bytes
ntp-segfault_on_invalid_device.patch 0000000452 452 Bytes
ntp-sntp-dst.patch 0000001743 1.7 KB
ntp-sntp-libevent.patch 0000004918 4.8 KB
ntp-strcat.patch 0000000644 644 Bytes
ntp.NetworkManager 0000000351 351 Bytes
ntp.changes 0000083578 81.6 KB
ntp.spec 0000012080 11.8 KB
ntptime.8.gz 0000000662 662 Bytes
Revision 124 (latest revision is 140)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 817085 from Reinhard Max's avatar Reinhard Max (rmax) (revision 124)
- Update to 4.2.8p15
- Fixed security issues:
  * bsc#1169740, CVE-2020-11868:
    DoS on client ntpd using server mode packet
  * bsc#1171355, CVE-2018-8956: remote attackers may prevent a
    broadcast client from synchronizing its clock with a broadcast
    NTP server via spoofed mode 3 and mode 5 packets.
  * bsc#1172651, CVE-2020-13817: vulnerable to off-path attack
  * bsc#1173334, CVE-2020-15025: Remote DoS when CMAC key is used
- Bugfixes in 4.2.8p15 and 4.2.8p14 include:
  * [Bug 3667] decodenetnum fails with numeric port
  * [Bug 3666] avoid unlimited receive buffer allocation
  * [Bug 3660] Manycast orphan mode startup discovery problem.
  * [Bug 3655] ntpdc memstats hash counts
  * [Bug 3653] Refclock jitter RMS calculation
  * [Bug 3646] Avoid sync with unsync orphan
  * [Bug 3644] Unsynchronized server [...] selected as candidate
  * [Bug 3636] NMEA: combine time/date from multiple sentences
  * [Bug 3635] Make leapsecond file hash check optional
  * [Bug 3628] raw DCF decoding - improve robustness
  * [Bug 3620] memory leak in ntpq sysinfo
  * [Bug 3619] Honour drefid setting in cooked mode and sysinfo
  * [Bug 3617] Add support for ACE III and Copernicus II receivers
  * [Bug 3615] accelerate refclock startup
  * [Bug 3613] Propagate noselect to mobilized pool servers
  * [Bug 3612] Use-of-uninitialized-value in receive function
  * [Bug 3611] NMEA time interpreted incorrectly
  * [Bug 3609] Fixing wrong falseticker in case of non-statistic jitter
  * [Bug 3604] Wrong param byte order passing into
    record_raw_stats() in ntp_io.c
Comments 0
openSUSE Build Service is sponsored by