Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

ntp-4.2.8p11-1.1.mga6 RPM for armv7hl

From Mageia 6 for armv7hl / media / core / updates

Name: ntp Distribution: Mageia
Version: 4.2.8p11 Vendor: Mageia.Org
Release: 1.1.mga6 Build date: Tue May 1 15:08:46 2018
Group: System/Servers Build host: localhost
Size: 2001731 Source RPM: ntp-4.2.8p11-1.1.mga6.src.rpm
Packager: zezinho <zezinho>
Summary: Synchronizes system time using the Network Time Protocol (NTP)
The Network Time Protocol (NTP) is used to synchronize a computer's time
with another reference time source. This package includes ntpd
(a daemon which continuously adjusts system time) and utilities used
to query and configure the ntpd daemon.

Perl scripts are in the ntp-perl package, ntpdate is in the ntpdate
package and sntp is in the sntp package. The documentation in HTML
format is in the ntp-doc package.






* Tue May 01 2018 zezinho <zezinho> 4.2.8p11-1.1.mga6
  (not released yet)
  + Revision: 1224173
  - sync forgotten SOURCES files with cauldron mga#22978
  - remove pps-tools dep as it was not in MGA6
  - new version 4.2.8p11 fixes security bug MGA#22850
* Wed Mar 29 2017 luigiwalser <luigiwalser> 4.2.6p5-33.mga6
  + Revision: 1095163
  - add patches from fedora to fix security issues:
    - fix crash with invalid unpeer command (CVE-2017-6463)
    - fix buffer overflow in datum refclock driver (CVE-2017-6462)
    - fix potential buffer overflow in mx4200 refclock driver (CVE-2017-6451)
    - fix potential buffer overflows in formatting of ntpq responses
    - fix potential crash with invalid server command (CVE-2017-6464)
  - update patches from fedora to fix bugs:
    - fix CVE-2016-7429 patch to work correctly on multicast client
    - fix typos in ntpd man page (#1434755)
* Fri Nov 25 2016 luigiwalser <luigiwalser> 4.2.6p5-32.mga6
  + Revision: 1070155
  - add patches from fedora to fix security issues:
    - don't limit rate of packets from sources (CVE-2016-7426)
    - don't change interface from received packets (CVE-2016-7429)
    - require authentication for trap commands (CVE-2016-9310)
    - fix crash when reporting peer event to trappers (CVE-2016-9311)
* Fri Jun 03 2016 luigiwalser <luigiwalser> 4.2.6p5-31.mga6
  + Revision: 1020184
  - add patches from fedora to fix more security issues:
    - CVE-2015-8139
    - CVE-2016-4954
    - CVE-2016-4955
    - CVE-2016-4956
* Thu May 12 2016 luigiwalser <luigiwalser> 4.2.6p5-30.mga6
  + Revision: 1014159
  - add patches from fedora to fix more bugs and security issues:
  - update reference timestamp in orphan mode
  - allow sources specified by IPv6 link-local address
  - don't allow spoofed packet to enable symmetric interleaved mode
  - don't crash on duplicate address in unconfig command (CVE-2016-2516)
  - check mode of new source in config command (CVE-2016-2518)
  - make MAC check resilient against timing attack (CVE-2016-1550)
* Mon Jan 25 2016 luigiwalser <luigiwalser> 4.2.6p5-28.mga6
  + Revision: 927118
  - rename CVE-2015-5196 to CVE-2015-7703
  - fix CVE-2015-7692 patch name
  - add patches from fedora to fix several bugs and security issues:
  - report clock state changes related to leap seconds
  - allow -4/-6 on restrict lines with mask
  - explain synchronised state in ntpstat man page
  - don't accept server/peer packets with zero origin timestamp (CVE-2015-8138)
  - fix crash with reslist command (CVE-2015-7977, CVE-2015-7978)
  - fix infinite loop in ntpq/ntpdc (CVE-2015-8158)
  - check key ID in packets authenticated with symmetric key (CVE-2015-7974)
  - don't allow spoofed packets to demobilize associations using symmetric key
* Wed Oct 28 2015 luigiwalser <luigiwalser> 4.2.6p5-27.mga6
  + Revision: 896075
  - add patches from ubuntu to fix CVE-2015-785[035]
* Thu Oct 22 2015 luigiwalser <luigiwalser> 4.2.6p5-26.mga6
  + Revision: 894253
  - sync with fedora to fix October 2015 security issues:
    - check origin timestamp before accepting KoD RATE packet (CVE-2015-7704)
    - allow only one step larger than panic threshold with -g (CVE-2015-5300)
    - fix memory leak with autokey (CVE-2015-7701)
    - don't crash with crafted autokey packet (CVE-2015-7691, CVE-2015-7692,
    - don't crash in ntpq with crafted packet (CVE-2015-7852)
    - don't mobilize passive association with crypto NAK (CVE-2015-7871)
* Wed Sep 02 2015 luigiwalser <luigiwalser> 4.2.6p5-25.mga6
  + Revision: 872222
  - add patches from fedora to fix CVE-2015-5146, CVE-2015-519[4-6], CVE-2015-5219



Generated by rpm2html 1.8.1

Fabrice Bellet, Mon Feb 10 04:16:34 2020