Package Release Info

ntp-4.2.8p17-bp160.1.14

Update Info: Base Release
Available in Package Hub : 16.0

platforms

AArch64
ppc64le
s390x
x86-64

subpackages

ntp
ntp-dcf77-tools
ntp-doc

Change Logs

* Fri May 24 2024 Thorsten Kukuk <kukuk@suse.com>
- Drop initscripts-legacy support [jsc#PED264]
- Drop rc<service> symlinks [jsc#PED-264], [jsc#PED-266]
* Wed Apr 24 2024 Marcus Meissner <meissner@suse.com>
- Get-rid-of-EVP_MD_CTX_FLAG_NON_FIPS_ALLOW.patch:
  Allow certain usages of MD5 in FIPS mode. (bsc#1222865)
* Thu Feb 22 2024 Dominique Leuenberger <dimstar@opensuse.org>
- Use %patch -P N instead of deprecated %patchN.
* Wed Jun 07 2023 Reinhard Max <max@suse.com>
- Update to 4.2.8p17:
  * Fix some regressions of 4.2.8p16
- Update to 4.2.8p16:
  * [Sec 3808] Assertion failure in ntpq on malformed RT-11 date
  * [Sec 3807], bsc#1210390, CVE-2023-26555:
    praecis_parse() in the Palisade refclock driver has a
    hypothetical input buffer overflow.
  * [Sec 3767] An OOB KoD RATE value triggers an assertion when
    debug is enabled.
  * Obsoletes: ntp-CVE-2023-26551.patch, ntp-sntp-dst.patch,
    ntp-ENOBUFS.patch
  * Multiple bug fixes and improvements. For details, see:
    /usr/share/doc/packages/ntp/ChangeLog
    http://www.ntp.org/support/securitynotice/4_2_8-series-changelog/
- Follow upstream's suggestion to build with debugging disabled:
  https://www.ntp.org/support/securitynotice/ntpbug3767/
* Fri May 05 2023 Reinhard Max <max@suse.com>
- bsc#1210386: out-of-bounds writes in mstolfp()
  * CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554
  * Add ntp-CVE-2023-26551.patch
* Tue Feb 07 2023 Reinhard Max <max@suse.com>
- bsc#1208004: Make %post script SELinux aware
* Sat Jan 28 2023 Dirk Müller <dmueller@suse.com>
- run bash specific post with bash
* Thu Jan 26 2023 Reinhard Max <max@suse.com>
- boo#1207577: set /var/lib/ntp/var/run/ntp to 775
* Thu Feb 24 2022 Jonathan Kang <songchuan.kang@suse.com>
- Modified ntp.NetworkManager: Update ntp servers on
  dhcp4-change and dhcp6-change, instead of up condition. This is
  because ntp options are available during dhcp renewed or rebound,
  and not available when the interface has been activated
  (bsc#1171547).
* Tue Oct 12 2021 Johannes Segitz <jsegitz@suse.com>
- Added hardening to systemd service(s) (bsc#1181400). Modified:
  * conf.ntp-wait.service
  * conf.ntpd.service