The hardware and bandwidth for this mirror is donated by dogado GmbH, the Webhosting and Full Service-Cloud Provider. Check out our Wordpress Tutorial.
If you wish to report a bug, or if you are interested in having us mirror your free-software or open-source project, please feel free to contact us at mirror[@]dogado.de.

system environment/daemons

ntp - The NTP daemon and utilities

Website: http://www.ntp.org
License: (MIT and BSD and BSD with advertising) and GPLv2
Vendor: Scientific Linux
Description:
The Network Time Protocol (NTP) is used to synchronize a computer's
time with another reference time source. This package includes ntpd
(a daemon which continuously adjusts system time) and utilities used
to query and configure the ntpd daemon.

Perl scripts ntp-wait and ntptrace are in the ntp-perl package,
ntpdate is in the ntpdate package and sntp is in the sntp package.
The documentation is in the ntp-doc package.

Packages

ntp-4.2.6p5-29.el7_8.2.x86_64 [524 KiB] Changelog by Miroslav Lichvar (2020-06-01):
- don't update transmission time on invalid response (CVE-2020-11868)
- randomize transmit timestamp in client requests (CVE-?, #1813787)
ntp-4.2.6p5-29.el7.x86_64 [524 KiB] Changelog by Miroslav Lichvar (2019-01-11):
- fix CVE-2016-7429 patch to restore default ttl configuration (#1550637)
- fix buffer overflow in parsing of address in ntpq and ntpdc (CVE-2018-12327)
- fix crash in parsing of received address in ntpq (#1616250)
- avoid reading freed memory after disabling netlink socket (#1555401)
- don't disable netlink socket on ENOBUFS error (#1555413)
- replace ntpstat with shell script using ntpq and supporting chrony (#1592871)
ntp-4.2.6p5-28.el7.x86_64 [524 KiB] Changelog by Miroslav Lichvar (2017-10-09):
- fix buffer overflow in datum refclock driver (CVE-2017-6462)
- fix crash with invalid unpeer command (CVE-2017-6463)
- fix potential crash with invalid server command (CVE-2017-6464)
- add Spectracom TSYNC driver (#1491797)
- fix initialization of system clock status (#1493452)
- fix typos in ntpd man page (#1420453)
- use SHA1 request key by default (#1442083)
- use network-online target in ntpdate and sntp services (#1466947)
ntp-4.2.6p5-25.el7_3.1.x86_64 [546 KiB] Changelog by Miroslav Lichvar (2017-01-11):
- don't limit rate of packets from sources (CVE-2016-7426)
- don't change interface from received packets (CVE-2016-7429)
- fix calculation of root distance again (CVE-2016-7433)
- require authentication for trap commands (CVE-2016-9310)
- fix crash when reporting peer event to trappers (CVE-2016-9311)
ntp-4.2.6p5-25.el7.x86_64 [545 KiB] Changelog by Miroslav Lichvar (2016-05-03):
- don't allow spoofed packet to enable symmetric interleaved mode
  (CVE-2016-1548)
- check mode of new source in config command (CVE-2016-2518)
- make MAC check resilient against timing attack (CVE-2016-1550)
ntp-4.2.6p5-22.el7_2.2.x86_64 [542 KiB] Changelog by Miroslav Lichvar (2016-05-03):
- don't allow spoofed packets to demobilize associations (CVE-2015-7979,
  CVE-2016-1547)
- don't allow spoofed packet to enable symmetric interleaved mode
  (CVE-2016-1548)
- check mode of new source in config command (CVE-2016-2518)
- make MAC check resilient against timing attack (CVE-2016-1550)
ntp-4.2.6p5-22.el7_2.1.x86_64 [542 KiB] Changelog by Miroslav Lichvar (2016-01-20):
- don't accept server/peer packets with zero origin timestamp (CVE-2015-8138)
ntp-4.2.6p5-22.el7.x86_64 [542 KiB] Changelog by Miroslav Lichvar (2015-10-16):
- check origin timestamp before accepting KoD RATE packet (CVE-2015-7704)
- allow only one step larger than panic threshold with -g (CVE-2015-5300)
ntp-4.2.6p5-19.el7_1.3.x86_64 [539 KiB] Changelog by Scientific Linux Auto Patch Process (2015-10-26):
- Eliminated rpmbuild "bogus date" error due to inconsistent weekday,
  by assuming the date is correct and changing the weekday.

Listing created by Repoview-0.6.6-4.el7

These binaries (installable software) and packages are in development.
They may not be fully stable and should be used with caution. We make no claims about them.
Health stats visible at Monitor.