Jump to letter: [
ABCDEFGHIJKLMNOPQRSTUVWXYZ
]
ntp - The NTP daemon and utilities
Website: |
http://www.ntp.org |
License: |
(MIT and BSD and BSD with advertising) and GPLv2 |
Vendor: |
Fedora Project |
- Description:
The Network Time Protocol (NTP) is used to synchronize a computer's
time with another reference time source. This package includes ntpd
(a daemon which continuously adjusts system time) and utilities used
to query and configure the ntpd daemon.
Perl scripts ntp-wait and ntptrace are in the ntp-perl package,
ntpdate is in the ntpdate package and sntp is in the sntp package.
The documentation is in the ntp-doc package.
Packages
ntp-4.2.6p5-41.fc22.i686
[557 KiB] |
Changelog
by Miroslav Lichvar (2016-06-02):
- don't disclose sensitive timestamps in ntpq/ntpdc responses (CVE-2015-8139)
- drop spoofed packets sooner (CVE-2016-4954)
- don't allow spoofed packets to reset associations using autokey
(CVE-2016-4955)
- check authentication before switching broadcast interleaved mode
(CVE-2016-4956)
|
ntp-4.2.6p5-40.fc22.i686
[556 KiB] |
Changelog
by Miroslav Lichvar (2016-05-02):
- don't allow spoofed packet to enable symmetric interleaved mode
(CVE-2016-1548)
- don't crash on duplicate address in unconfig command (CVE-2016-2516)
- check mode of new source in config command (CVE-2016-2518)
- make MAC check resilient against timing attack (CVE-2016-1550)
|
ntp-4.2.6p5-36.fc22.i686
[555 KiB] |
Changelog
by Miroslav Lichvar (2016-01-21):
- don't accept server/peer packets with zero origin timestamp (CVE-2015-8138)
- fix crash with reslist command (CVE-2015-7977, CVE-2015-7978)
- fix infinite loop in ntpq/ntpdc (CVE-2015-8158)
- check key ID in packets authenticated with symmetric key (CVE-2015-7974)
- don't allow spoofed packets to demobilize associations using symmetric key
(CVE-2015-7979)
|