Network Time Protocol daemon (version 4)
The Network Time Protocol (NTP) is used to synchronize the time of a
computer client or server to another server or reference time source,
such as a radio, satellite receiver, or modem.
Ntpd is an operating system daemon that sets and maintains the system
time-of-day synchronized with Internet standard time servers.
- Developed at network:time
- Sources inherited from project openSUSE:Factory
-
3
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Leap:16.0:FactoryCandidates/ntp && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
MOD_NANO.diff | 0000000479 479 Bytes | |
NTP-FAQ-3.4.tar.bz2 | 0000271146 265 KB | |
README.SUSE | 0000000519 519 Bytes | |
bnc#506908.diff | 0000000391 391 Bytes | |
bnc#574885.diff | 0000000637 637 Bytes | |
conf.logrotate.ntp | 0000000187 187 Bytes | |
conf.ntp-wait.service | 0000000398 398 Bytes | |
conf.ntp.conf | 0000002977 2.91 KB | |
conf.ntp.reg | 0000000310 310 Bytes | |
conf.ntpd.service | 0000000457 457 Bytes | |
conf.start-ntpd | 0000005594 5.46 KB | |
conf.sysconfig.ntp | 0000001937 1.89 KB | |
conf.sysconfig.syslog-ntp | 0000000430 430 Bytes | |
ntp-4.2.6p2-seed_file.patch | 0000000558 558 Bytes | |
ntp-4.2.8p15.tar.gz | 0007015970 6.69 MB | |
ntp-ENOBUFS.patch | 0000000691 691 Bytes | |
ntp-move-kod-file.patch | 0000004008 3.91 KB | |
ntp-netlink.patch | 0000000518 518 Bytes | |
ntp-openssl-version.patch | 0000000500 500 Bytes | |
ntp-pathfind.patch | 0000000794 794 Bytes | |
ntp-segfault_on_invalid_device.patch | 0000000452 452 Bytes | |
ntp-sntp-dst.patch | 0000001743 1.7 KB | |
ntp-sntp-libevent.patch | 0000004918 4.8 KB | |
ntp-strcat.patch | 0000000644 644 Bytes | |
ntp.NetworkManager | 0000000351 351 Bytes | |
ntp.changes | 0000083578 81.6 KB | |
ntp.spec | 0000012080 11.8 KB | |
ntptime.8.gz | 0000000662 662 Bytes |
Revision 124 (latest revision is 140)
Dominique Leuenberger (dimstar_suse)
accepted
request 817085
from
Reinhard Max (rmax)
(revision 124)
- Update to 4.2.8p15 - Fixed security issues: * bsc#1169740, CVE-2020-11868: DoS on client ntpd using server mode packet * bsc#1171355, CVE-2018-8956: remote attackers may prevent a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed mode 3 and mode 5 packets. * bsc#1172651, CVE-2020-13817: vulnerable to off-path attack * bsc#1173334, CVE-2020-15025: Remote DoS when CMAC key is used - Bugfixes in 4.2.8p15 and 4.2.8p14 include: * [Bug 3667] decodenetnum fails with numeric port * [Bug 3666] avoid unlimited receive buffer allocation * [Bug 3660] Manycast orphan mode startup discovery problem. * [Bug 3655] ntpdc memstats hash counts * [Bug 3653] Refclock jitter RMS calculation * [Bug 3646] Avoid sync with unsync orphan * [Bug 3644] Unsynchronized server [...] selected as candidate * [Bug 3636] NMEA: combine time/date from multiple sentences * [Bug 3635] Make leapsecond file hash check optional * [Bug 3628] raw DCF decoding - improve robustness * [Bug 3620] memory leak in ntpq sysinfo * [Bug 3619] Honour drefid setting in cooked mode and sysinfo * [Bug 3617] Add support for ACE III and Copernicus II receivers * [Bug 3615] accelerate refclock startup * [Bug 3613] Propagate noselect to mobilized pool servers * [Bug 3612] Use-of-uninitialized-value in receive function * [Bug 3611] NMEA time interpreted incorrectly * [Bug 3609] Fixing wrong falseticker in case of non-statistic jitter * [Bug 3604] Wrong param byte order passing into record_raw_stats() in ntp_io.c
Comments 0