Name: | sntp |
---|---|
Version: | 4.2.6p5 |
Release: | 25.0.1.el7 |
Architecture: | x86_64 |
Group: | Applications/System |
Size: | 111103 |
License: | (MIT and BSD and BSD with advertising) and GPLv2 |
RPM: | sntp-4.2.6p5-25.0.1.el7.x86_64.rpm |
Source RPM: | ntp-4.2.6p5-25.0.1.el7.src.rpm |
Build Date: | Fri Sep 09 2016 |
Build Host: | x86-ol7-builder-02.us.oracle.com |
Vendor: | Oracle America |
URL: | http://www.ntp.org |
Summary: | Standard Simple Network Time Protocol program |
Description: | sntp can be used as a SNTP client to query a NTP or SNTP server and either display the time or set the local system's time (given suitable privilege). It can be run as an interactive command or in a cron job. |
- add disable monitor to default ntp.conf [CVE-2013-5211]
- don't allow spoofed packet to enable symmetric interleaved mode (CVE-2016-1548) - check mode of new source in config command (CVE-2016-2518) - make MAC check resilient against timing attack (CVE-2016-1550)
- fix crash with invalid logconfig command (CVE-2015-5194) - fix crash when referencing disabled statistic type (CVE-2015-5195) - don't hang in sntp with crafted reply (CVE-2015-5219) - don't crash with crafted autokey packet (CVE-2015-7691, CVE-2015-7692, CVE-2015-7702) - fix memory leak with autokey (CVE-2015-7701) - don't allow setting driftfile and pidfile remotely (CVE-2015-7703) - don't crash in ntpq with crafted packet (CVE-2015-7852) - check key ID in packets authenticated with symmetric key (CVE-2015-7974) - fix crash with reslist command (CVE-2015-7977, CVE-2015-7978) - don't allow spoofed packets to demobilize associations (CVE-2015-7979, CVE-2016-1547) - don't accept server/peer packets with zero origin timestamp (CVE-2015-8138) - fix infinite loop in ntpq/ntpdc (CVE-2015-8158) - fix resetting of leap status (#1242553) - extend rawstats log (#1242877) - report clock state changes related to leap seconds (#1242935) - allow -4/-6 on restrict lines with mask (#1304492) - explain synchronised state in ntpstat man page (#1309594)
- check origin timestamp before accepting KoD RATE packet (CVE-2015-7704) - allow only one step larger than panic threshold with -g (CVE-2015-5300)
- validate lengths of values in extension fields (CVE-2014-9297) - drop packets with spoofed source address ::1 (CVE-2014-9298) - reject packets without MAC when authentication is enabled (CVE-2015-1798) - protect symmetric associations with symmetric key against DoS attack (CVE-2015-1799) - fix generation of MD5 keys with ntp-keygen on big-endian systems (CVE-2015-3405) - add option to set Differentiated Services Code Point (DSCP) (#1202828) - add nanosecond support to SHM refclock (#1117702) - allow creating all SHM segments with owner-only access (#1122012) - allow different thresholds for forward and backward step (#1193154) - allow symmetric keys up to 32 bytes again (#1191111) - don't step clock for leap second with -x option (#1191122) - don't drop packets with source port below 123 (#1171640) - retry joining multicast groups (#1207014) - increase memlock limit again (#1053569) - warn when monitor can't be disabled due to limited restrict (#1191108) - use larger RSA exponent in ntp-keygen (#1191116) - fix crash in ntpq mreadvar command (#1180721) - move sntp kod database to allow SELinux labeling (#1082934) - fix typos in ntpd man page (#1195211) - improve documentation of restrict command (#1213953)
- don't generate weak control key for resolver (CVE-2014-9293) - don't generate weak MD5 keys in ntp-keygen (CVE-2014-9294) - fix buffer overflows via specially-crafted packets (CVE-2014-9295) - don't mobilize passive association when authentication fails (CVE-2014-9296)
- disable monitor in default ntp.conf (#1047856)
- Mass rebuild 2014-01-24
- refresh peers on routing updates (#1048132) - fix calculation of root dispersion (#1045377) - remove unnecessary IPv6 restrict line from default ntp.conf (#1048255) - remove kod from default restrict in ntp.conf (#1048255) - update logconfig documentation for patched default (#1048252)
- Mass rebuild 2013-12-27