The hardware and bandwidth for this mirror is donated by dogado GmbH, the Webhosting and Full Service-Cloud Provider. Check out our Wordpress Tutorial.
If you wish to report a bug, or if you are interested in having us mirror your free-software or open-source project, please feel free to contact us at mirror[@]dogado.de.

applications/system

ntpdate - Utility to set the date and time via NTP

Website: http://www.ntp.org
License: (MIT and BSD and BSD with advertising) and GPLv2
Vendor: Scientific Linux
Description:
ntpdate is a program for retrieving the date and time from
NTP servers.

Packages

ntpdate-4.2.6p5-29.el7_8.2.x86_64 [83 KiB] Changelog by Miroslav Lichvar (2020-06-01):
- don't update transmission time on invalid response (CVE-2020-11868)
- randomize transmit timestamp in client requests (CVE-?, #1813787)
ntpdate-4.2.6p5-29.el7.x86_64 [83 KiB] Changelog by Miroslav Lichvar (2019-01-11):
- fix CVE-2016-7429 patch to restore default ttl configuration (#1550637)
- fix buffer overflow in parsing of address in ntpq and ntpdc (CVE-2018-12327)
- fix crash in parsing of received address in ntpq (#1616250)
- avoid reading freed memory after disabling netlink socket (#1555401)
- don't disable netlink socket on ENOBUFS error (#1555413)
- replace ntpstat with shell script using ntpq and supporting chrony (#1592871)
ntpdate-4.2.6p5-28.el7.x86_64 [83 KiB] Changelog by Miroslav Lichvar (2017-10-09):
- fix buffer overflow in datum refclock driver (CVE-2017-6462)
- fix crash with invalid unpeer command (CVE-2017-6463)
- fix potential crash with invalid server command (CVE-2017-6464)
- add Spectracom TSYNC driver (#1491797)
- fix initialization of system clock status (#1493452)
- fix typos in ntpd man page (#1420453)
- use SHA1 request key by default (#1442083)
- use network-online target in ntpdate and sntp services (#1466947)
ntpdate-4.2.6p5-25.el7_3.1.x86_64 [84 KiB] Changelog by Miroslav Lichvar (2017-01-11):
- don't limit rate of packets from sources (CVE-2016-7426)
- don't change interface from received packets (CVE-2016-7429)
- fix calculation of root distance again (CVE-2016-7433)
- require authentication for trap commands (CVE-2016-9310)
- fix crash when reporting peer event to trappers (CVE-2016-9311)
ntpdate-4.2.6p5-25.el7.x86_64 [84 KiB] Changelog by Miroslav Lichvar (2016-05-03):
- don't allow spoofed packet to enable symmetric interleaved mode
  (CVE-2016-1548)
- check mode of new source in config command (CVE-2016-2518)
- make MAC check resilient against timing attack (CVE-2016-1550)
ntpdate-4.2.6p5-22.el7_2.2.x86_64 [83 KiB] Changelog by Miroslav Lichvar (2016-05-03):
- don't allow spoofed packets to demobilize associations (CVE-2015-7979,
  CVE-2016-1547)
- don't allow spoofed packet to enable symmetric interleaved mode
  (CVE-2016-1548)
- check mode of new source in config command (CVE-2016-2518)
- make MAC check resilient against timing attack (CVE-2016-1550)
ntpdate-4.2.6p5-22.el7_2.1.x86_64 [82 KiB] Changelog by Miroslav Lichvar (2016-01-20):
- don't accept server/peer packets with zero origin timestamp (CVE-2015-8138)
ntpdate-4.2.6p5-22.el7.x86_64 [82 KiB] Changelog by Miroslav Lichvar (2015-10-16):
- check origin timestamp before accepting KoD RATE packet (CVE-2015-7704)
- allow only one step larger than panic threshold with -g (CVE-2015-5300)
ntpdate-4.2.6p5-19.el7_1.3.x86_64 [81 KiB] Changelog by Scientific Linux Auto Patch Process (2015-10-26):
- Eliminated rpmbuild "bogus date" error due to inconsistent weekday,
  by assuming the date is correct and changing the weekday.

Listing created by Repoview-0.6.6-4.el7

These binaries (installable software) and packages are in development.
They may not be fully stable and should be used with caution. We make no claims about them.
Health stats visible at Monitor.