| Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
| Name: ntp-dcf77-tools | Distribution: openSUSE Tumbleweed |
| Version: 4.2.8p18 | Vendor: openSUSE |
| Release: 2.1 | Build date: Fri Aug 29 13:24:53 2025 |
| Group: Hardware/Other | Build host: reproducible |
| Size: 31856 | Source RPM: ntp-4.2.8p18-2.1.src.rpm |
| Packager: http://bugs.opensuse.org | |
| Url: http://www.ntp.org/ | |
| Summary: DCF77 related tools | |
DCF77 related programs.
There are currently two tools:
* testdcf, a simple DCF77 raw impulse test program.
* dcfd, a simple DCF77 raw impulse receiver with NTP loopfilter
mechanics for synchronisation.
BSD-3-Clause AND MIT AND BSD-4-Clause AND GPL-2.0-only
* Fri Aug 29 2025 Reinhard Max <max@suse.com>
- bsc#1247587: Fix a crash when calling "sntp -d".
* ntp-sntp-assert.patch
- Update source URL.
* Wed Feb 05 2025 Reinhard Max <max@suse.com>
- Update to 4.2.8p18
* obsoletes Get-rid-of-EVP_MD_CTX_FLAG_NON_FIPS_ALLOW.patch
* Multiple bug fixes and improvements. For details, see:
/usr/share/doc/packages/ntp/ChangeLog
http://www.ntp.org/support/securitynotice/4_2_8-series-changelog/
- bsc#1233890: chown refclock device to ntp user on startup.
- ntp-check-argv.patch: Improve the handling of the process name of
the forked-off DNS resolver process.
* Fri May 24 2024 Thorsten Kukuk <kukuk@suse.com>
- Drop initscripts-legacy support [jsc#PED264]
- Drop rc<service> symlinks [jsc#PED-264], [jsc#PED-266]
* Wed Apr 24 2024 Marcus Meissner <meissner@suse.com>
- Get-rid-of-EVP_MD_CTX_FLAG_NON_FIPS_ALLOW.patch:
Allow certain usages of MD5 in FIPS mode. (bsc#1222865)
* Thu Feb 22 2024 Dominique Leuenberger <dimstar@opensuse.org>
- Use %patch -P N instead of deprecated %patchN.
* Wed Jun 07 2023 Reinhard Max <max@suse.com>
- Update to 4.2.8p17:
* Fix some regressions of 4.2.8p16
- Update to 4.2.8p16:
* [Sec 3808] Assertion failure in ntpq on malformed RT-11 date
* [Sec 3807], bsc#1210390, CVE-2023-26555:
praecis_parse() in the Palisade refclock driver has a
hypothetical input buffer overflow.
* [Sec 3767] An OOB KoD RATE value triggers an assertion when
debug is enabled.
* Obsoletes: ntp-CVE-2023-26551.patch, ntp-sntp-dst.patch,
ntp-ENOBUFS.patch
* Multiple bug fixes and improvements. For details, see:
/usr/share/doc/packages/ntp/ChangeLog
http://www.ntp.org/support/securitynotice/4_2_8-series-changelog/
- Follow upstream's suggestion to build with debugging disabled:
https://www.ntp.org/support/securitynotice/ntpbug3767/
* Fri May 05 2023 Reinhard Max <max@suse.com>
- bsc#1210386: out-of-bounds writes in mstolfp()
* CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554
* Add ntp-CVE-2023-26551.patch
* Tue Feb 07 2023 Reinhard Max <max@suse.com>
- bsc#1208004: Make %post script SELinux aware
* Sat Jan 28 2023 Dirk Müller <dmueller@suse.com>
- run bash specific post with bash
* Thu Jan 26 2023 Reinhard Max <max@suse.com>
- boo#1207577: set /var/lib/ntp/var/run/ntp to 775
* Thu Feb 24 2022 Jonathan Kang <songchuan.kang@suse.com>
- Modified ntp.NetworkManager: Update ntp servers on
dhcp4-change and dhcp6-change, instead of up condition. This is
because ntp options are available during dhcp renewed or rebound,
and not available when the interface has been activated
(bsc#1171547).
/usr/bin/dcfd /usr/bin/testdcf
Generated by rpm2html 1.8.1
Fabrice Bellet, Fri Oct 24 23:22:36 2025