Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

ntp-dcf77-tools-4.2.8p17-4.3 RPM for i586

From OpenSuSE Ports Tumbleweed for i586

Name: ntp-dcf77-tools Distribution: openSUSE Tumbleweed
Version: 4.2.8p17 Vendor: openSUSE
Release: 4.3 Build date: Fri May 24 15:38:02 2024
Group: Hardware/Other Build host: reproducible
Size: 40028 Source RPM: ntp-4.2.8p17-4.3.src.rpm
Packager: http://bugs.opensuse.org
Url: http://www.ntp.org/
Summary: DCF77 related tools
DCF77 related programs.

There are currently two tools:
  * testdcf, a simple DCF77 raw impulse test program.
  * dcfd, a simple DCF77 raw impulse receiver with NTP loopfilter
    mechanics for synchronisation.

Provides

Requires

License

BSD-3-Clause AND MIT AND BSD-4-Clause AND GPL-2.0-only

Changelog

* Fri May 24 2024 Thorsten Kukuk <kukuk@suse.com>
  - Drop initscripts-legacy support [jsc#PED264]
  - Drop rc<service> symlinks [jsc#PED-264], [jsc#PED-266]
* Wed Apr 24 2024 Marcus Meissner <meissner@suse.com>
  - Get-rid-of-EVP_MD_CTX_FLAG_NON_FIPS_ALLOW.patch:
    Allow certain usages of MD5 in FIPS mode. (bsc#1222865)
* Thu Feb 22 2024 Dominique Leuenberger <dimstar@opensuse.org>
  - Use %patch -P N instead of deprecated %patchN.
* Wed Jun 07 2023 Reinhard Max <max@suse.com>
  - Update to 4.2.8p17:
    * Fix some regressions of 4.2.8p16
  - Update to 4.2.8p16:
    * [Sec 3808] Assertion failure in ntpq on malformed RT-11 date
    * [Sec 3807], bsc#1210390, CVE-2023-26555:
      praecis_parse() in the Palisade refclock driver has a
      hypothetical input buffer overflow.
    * [Sec 3767] An OOB KoD RATE value triggers an assertion when
      debug is enabled.
    * Obsoletes: ntp-CVE-2023-26551.patch, ntp-sntp-dst.patch,
      ntp-ENOBUFS.patch
    * Multiple bug fixes and improvements. For details, see:
      /usr/share/doc/packages/ntp/ChangeLog
      http://www.ntp.org/support/securitynotice/4_2_8-series-changelog/
  - Follow upstream's suggestion to build with debugging disabled:
    https://www.ntp.org/support/securitynotice/ntpbug3767/
* Fri May 05 2023 Reinhard Max <max@suse.com>
  - bsc#1210386: out-of-bounds writes in mstolfp()
    * CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554
    * Add ntp-CVE-2023-26551.patch
* Tue Feb 07 2023 Reinhard Max <max@suse.com>
  - bsc#1208004: Make %post script SELinux aware
* Sat Jan 28 2023 Dirk Müller <dmueller@suse.com>
  - run bash specific post with bash
* Thu Jan 26 2023 Reinhard Max <max@suse.com>
  - boo#1207577: set /var/lib/ntp/var/run/ntp to 775
* Thu Feb 24 2022 Jonathan Kang <songchuan.kang@suse.com>
  - Modified ntp.NetworkManager: Update ntp servers on
    dhcp4-change and dhcp6-change, instead of up condition. This is
    because ntp options are available during dhcp renewed or rebound,
    and not available when the interface has been activated
    (bsc#1171547).
* Tue Oct 12 2021 Johannes Segitz <jsegitz@suse.com>
  - Added hardening to systemd service(s) (bsc#1181400). Modified:
    * conf.ntp-wait.service
    * conf.ntpd.service

Files

/usr/bin/dcfd
/usr/bin/testdcf


Generated by rpm2html 1.8.1

Fabrice Bellet, Sun Jan 12 02:11:34 2025