Lines Matching refs:NTP

2 NTP 4.2.8p18 (Harlan Stenn <stenn@ntp.org>, 2024 May 24)
138 NTP 4.2.8p17 (Harlan Stenn <stenn@ntp.org>, 2023 Jun 06)
163 NTP 4.2.8p16 (Harlan Stenn <stenn@ntp.org>, 2023 May 30)
286 NTP 4.2.8p15 (Harlan Stenn <stenn@ntp.org>, 2020 Jun 23)
324 NTP 4.2.8p14 (Harlan Stenn <stenn@ntp.org>, 2020 Mar 03)
432 NTP 4.2.8p13 (Harlan Stenn <stenn@ntp.org>, 2019 Mar 07)
486 NTP 4.2.8p12 (Harlan Stenn <stenn@ntp.org>, 2018/14/09)
557 NTP 4.2.8p11 (Harlan Stenn <stenn@ntp.org>, 2018/02/27)
567 * NTP Bug 3454: Unauthenticated packet can reset authenticated interleaved
577 The NTP Protocol allows for both non-authenticated and
579 and several broadcast modes. In addition to the basic NTP
594 Upgrade to 4.2.8p11, or later, from the NTP Project Download Page
595 or the NTP Public Services Project Download Page.
605 * NTP Bug 3453: Interleaved symmetric mode cannot recover from bad
626 Upgrade to ntp-4.2.8p11 or later from the NTP Project Download Page
627 or the NTP Public Services Project Download Page.
635 * NTP Bug 3415: Provide a way to prevent authenticated symmetric passive
660 Upgrade to ntp-4.2.8p11 or later from the NTP Project Download Page
661 or the NTP Public Services Project Download Page.
693 Upgrade to ntp-4.2.8p11 or later from the NTP Project Download Page
694 or the NTP Public Services Project Download Page.
698 * NTP Bug 3412: ctl_getitem(): buffer read overrun leads to undefined
713 Upgrade to ntp-4.2.8p11 or later from the NTP Project Download Page
714 or the NTP Public Services Project Download Page.
721 * NTP Bug 3012: Sybil vulnerability: ephemeral association attack
745 Upgrade to 4.2.8p11, or later, from the NTP Project Download Page or
746 the NTP Public Services Project Download Page.
773 [Bug 3435] anchor NTP era alignment <perlinger@ntp.org>
791 [Bug 3399] NTP: linker error in 4.2.8p10 during Linux cross-compilation
882 NTP 4.2.8p10 (Harlan Stenn <stenn@ntp.org>, 2017/03/21)
891 * NTP-01-016 NTP: Denial of Service via Malformed Config (Medium)
894 Affects: All versions of NTP-4, up to but not including ntp-4.2.8p10, and
899 A vulnerability found in the NTP server makes it possible for an
904 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page or
905 the NTP Public Services Project Download Page
911 * NTP-01-014 NTP: Buffer Overflow in DPTS Clock (Low)
914 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and ntp-4.3.0 up to, but not including ntp-4.3.94.
928 later, from the NTP Project Download Page or the NTP Public
935 * NTP-01-012 NTP: Authenticated DoS via Malicious Config Option (Medium)
943 A vulnerability found in the NTP server allows an authenticated
950 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
951 or the NTP Public Services Project Download Page
957 * NTP-01-011 NTP: ntpq_stripquotes() returns incorrect value (Informational)
960 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and
965 The NTP Mode 6 monitoring and control client, ntpq, uses the
977 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
978 or the NTP Public Services Project Download Page
984 * NTP-01-010 NTP: ereallocarray()/eallocarray() underused (Info)
987 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and
990 NTP makes use of several wrappers around the standard heap memory
1005 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
1006 or the NTP Public Services Project Download Page
1010 * NTP-01-009 NTP: Privileged execution of User Library code (WINDOWS
1029 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
1030 or the NTP Public Services Project Download Page
1034 * NTP-01-008 NTP: Stack Buffer Overflow from Command Line (WINDOWS
1044 The Windows installer for NTP calls strcat(), blindly appending
1055 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
1056 or the NTP Public Services Project Download Page
1060 * NTP-01-007 NTP: Data Structure terminated insufficiently (WINDOWS
1070 The Windows installer for NTP calls strcpy() with an argument
1080 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
1081 or the NTP Public Services Project Download Page
1085 * NTP-01-006 NTP: Copious amounts of Unused Code (Informational)
1124 NTP doesn't use, OK. But other packages used these libraries as
1133 * NTP-01-005 NTP: Off-by-one in Oncore GPS Receiver (Low)
1136 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and
1145 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page or
1146 the NTP Public Services Project Download Page
1152 * NTP-01-004 NTP: Potential Overflows in ctl_put() functions (Medium)
1155 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and
1170 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
1171 or the NTP Public Services Project Download Page
1179 * NTP-01-003 NTP: Improper use of snprintf() in mx4200_send() (Low)
1182 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and
1204 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
1205 or the NTP Public Services Project Download Page.
1211 * NTP-01-002 NTP: Buffer Overflow in ntpq when fetching reslist from a
1229 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
1230 or the NTP Public Services Project Download Page
1238 * NTP-01-001 NTP: Makefile does not enforce Security Flags (Informational)
1241 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and
1246 The build process for NTP has not, by default, provided compile
1249 flags for their builds. As of ntp-4.2.8p10, the NTP build
1252 is specific to NTP builds. It's inefficient to have every
1259 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
1260 or the NTP Public Services Project Download Page
1285 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
1286 or the NTP Public Services Project Download Page
1329 * [Bug 3144] NTP does not build without openSSL. <perlinger@ntp.org>
1337 NTP 4.2.8p9 (Harlan Stenn <stenn@ntp.org>, 2016/11/21)
1364 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
1365 or the NTP Public Services Project Download Page
1389 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
1390 or the NTP Public Services Project Download Page
1403 The broadcast mode of NTP is expected to only be used in a
1407 functionality can be abused. An attacker with access to the NTP
1409 broadcast mode NTP packets into the broadcast domain which,
1411 mode packets from legitimate NTP broadcast servers.
1414 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
1415 or the NTP Public Services Project Download Page
1428 The broadcast mode of NTP is expected to only be used in a
1436 packet expires. An attacker with access to the NTP broadcast
1437 domain can send specially crafted broadcast mode NTP packets to
1439 cause ntpd to reject broadcast mode packets from legitimate NTP
1443 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
1444 or the NTP Public Services Project Download Page
1461 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
1462 or the NTP Public Services Project Download Page
1480 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
1481 or the NTP Public Services Project Download Page
1501 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
1502 or the NTP Public Services Project Download Page
1530 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
1531 or the NTP Public Services Project Download Page
1562 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
1563 or the NTP Public Services Project Download Page
1586 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
1587 or the NTP Public Services Project Download Page
1601 * [Bug 3116] unit tests for NTP time stamp expansion. <perlinger@ntp.org>
1644 NTP 4.2.8p8 (Harlan Stenn <stenn@ntp.org>, 2016/06/02)
1663 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page
1664 or the NTP Public Services Project Download Page
1684 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page
1685 or the NTP Public Services Project Download Page
1702 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page
1703 or the NTP Public Services Project Download Page
1721 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page
1722 or the NTP Public Services Project Download Page
1737 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page
1738 or the NTP Public Services Project Download Page
1743 * [Bug 3038] NTP fails to build in VS2015. perlinger@ntp.org
1756 NTP 4.2.8p7 (Harlan Stenn <stenn@ntp.org>, 2016/04/26)
1762 When building NTP from source, there is a new configure option
1775 * Improve NTP security against buffer comparison timing attacks,
1789 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
1790 or the NTP Public Services Project Download Page.
1810 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
1811 or the NTP Public Services Project Download Page
1841 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
1842 or the NTP Public Services Project Download Page
1869 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
1870 or the NTP Public Services Project Download Page
1887 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
1888 or the NTP Public Services Project Download Page
1910 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
1911 or the NTP Public Services Project Download Page
1931 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
1932 or the NTP Public Services Project Download Page
1940 Affects: On a very limited number of OSes, all NTP releases up to but
1955 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
1956 or the NTP Public Services Project Download Page
2000 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
2001 or the NTP Public Services Project Download Page. These
2033 * [Bug 2879] Improve NTP security against timing attacks. perlinger@ntp.org
2081 characteristics that are compatible with interleave mode, NTP will
2083 attacker can send a crafted forged packet to an NTP instance that
2092 This option controls whether or not NTP will, if conditions are right,
2097 NTP 4.2.8p6 (Harlan Stenn <stenn@ntp.org>, 2016/01/20)
2121 * Own a malicious NTP server that the client trusts
2122 * Prevent a legitimate NTP server from sending packets to
2125 and the NTP server
2127 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page
2128 or the NTP Public Services Project Download Page
2147 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page
2148 or the NTP Public Services Project Download Page.
2163 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page
2164 or the NTP Public Services Project Download Page.
2188 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page
2189 or the NTP Public Services Project Download Page.
2193 having smaller NTP broadcast domains.
2207 Upgrade to 4.2.8p6, or later, from NTP Project Download Page or
2208 the NTP Public Services Project Download Page.
2235 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page.
2237 build NTP with 'configure --disable-saveconfig' if you will
2261 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page
2262 or the NTP Public Services Project Download Page.
2289 upgrade to 4.2.8p6, or later, from the NTP Project Download
2290 Page or the NTP Public Services Project Download Page, and
2303 time servers will participate in an NTP broadcast domain,
2315 Summary: If an NTP network is configured for broadcast operations then
2320 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page
2321 or the NTP Public Services Project Download Page.
2350 NTP 4.2.8p5 (Harlan Stenn <stenn@ntp.org>, 2016/01/07)
2380 Upgrade to 4.2.8p5, or later, from the NTP Project Download
2381 Page or the NTP Public Services Project Download Page
2409 The NTP codebase has been undergoing regular Coverity scans on an
2450 NTP 4.2.8p4 (Harlan Stenn <stenn@ntp.org>, 2015/10/21)
2472 Upgrade to 4.2.8p4, or later, from the NTP Project Download
2473 Page or the NTP Public Services Project Download Page
2498 Upgrade to 4.2.8p4, or later, from the NTP Project Download Page
2499 or the NTP Public Services Project Download Page
2525 Upgrade to 4.2.8p4, or later, from the NTP Project Download
2526 Page or the NTP Public Services Project Download Page
2549 Upgrade to 4.2.8p4, or later, from the NTP Project Download
2550 Page or the NTP Public Services Project Download Page
2568 Upgrade to 4.2.8p4, or later, from the NTP Project Download
2569 Page or the NTP Public Services Project Download Page.
2594 Upgrade to 4.2.8p4, or later, from the NTP Project Download
2595 Page or the NTP Public Services Project Download Page.
2623 Upgrade to 4.2.8p4, or later, from the NTP Project Download
2624 Page or the NTP Public Services Project Download Page.
2649 Upgrade to 4.2.8p4, or later, from the NTP Project Download
2650 Page or the NTP Public Services Project Download Page.
2674 Upgrade to 4.2.8p4, or later, from the NTP Project Download
2675 Page or the NTP Public Services Project Download Page.
2704 Upgrade to 4.2.8p4, or later, from the NTP Project Download
2705 Page or the NTP Public Services Project Download Page.
2728 Upgrade to 4.2.8p4, or later, from the NTP Project Download
2729 Page or the NTP Public Services Project Download Page.
2753 Upgrade to 4.2.8p4, or later, from the NTP Project Download
2754 Page or the NTP Public Services Project Download Page.
2780 Upgrade to 4.2.8p4, or later, from the NTP Project Download
2781 Page or the NTP Public Services Project Download Page.
2877 * tests/libntp/sockaddrtest.h making it agree to NTP's conventions of formatting.
2909 * scripts/lib/NTP/Util.pm: stratum output is version-dependent. Harlan Stenn.
2945 NTP 4.2.8p3 (Harlan Stenn <stenn@ntp.org>, 2015/06/29)
3025 * [Bug 2822] New leap column in sntp broke NTP::Util.pm.
3094 NTP 4.2.8p2 (Harlan Stenn <stenn@ntp.org>, 2015/04/07)
3113 a remote NTP server/peer, it checks if the NTP message
3128 Upgrade to 4.2.8p2, or later, from the NTP Project Download Page
3129 or the NTP Public Services Project Download Page
3137 Affects: All NTP releases starting with at least xntp3.3wy up to but
3144 Summary: An attacker knowing that NTP hosts A and B are peering with
3146 with source address of B which will set the NTP state variables
3155 According to the document the NTP authentication is supposed to
3164 specifications, so other NTP implementations with support for
3166 An update to the NTP RFC to correct this error is in-process.
3168 Upgrade to 4.2.8p2, or later, from the NTP Project Download Page
3169 or the NTP Public Services Project Download Page
3192 * [Bug 2749] ntp/lib/NTP/Util.pm needs update for ntpq -w, IPv6, .POOL. .
3235 NTP 4.2.8p1 (Harlan Stenn <stenn@ntp.org>, 2015/02/04)
3255 Upgrade to 4.2.8p1, or later, from the NTP Project Download Page
3256 or the NTP Public Services Project Download Page.
3276 IPv6 interfaces. Since NTP's access control is based on source
3280 not really a bug in NTP, it's a problem with some OSes. If you
3284 Upgrade to 4.2.8p1, or later, from the NTP Project Download Page
3285 or the NTP Public Services Project Download Page
3295 NTP 4.2.8 (Harlan Stenn <stenn@ntp.org>, 2014/12/18)
3455 * Internal NTP Era counters
3506 NTP 4.2.6p5 (Harlan Stenn <stenn@ntp.org>, 2011/12/24)
3546 NTP 4.2.6p4 (Harlan Stenn <stenn@ntp.org>, 2011/09/22)
3609 NTP 4.2.6p3 (Harlan Stenn <stenn@ntp.org>, 2011/01/03)
3685 NTP 4.2.6p2 (Harlan Stenn <stenn@ntp.org>, 2010/07/08)
3724 NTP 4.2.6p1 (Harlan Stenn <stenn@ntp.org>, 2010/04/09)
3733 NTP 4.2.6 (Harlan Stenn <stenn@ntp.org>, 2009/12/08)
3738 NTP 4.2.4p8 (Harlan Stenn <stenn@ntp.org>, 2009/12/08)
3750 NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility.
3751 In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time
3780 NTP 4.2.4p7 (Harlan Stenn <stenn@ntp.org>, 2009/05/04)
3818 NTP 4.2.4p6 (Harlan Stenn <stenn@ntp.org>, 2009/01/07)
3830 the problem in NTP and telling us about it.
3834 NTP 4.2.4p5 (Harlan Stenn <stenn@ntp.org>, 2008/08/17)
3851 NTP 4.2.4p4 (Harlan Stenn <stenn@ntp.org>, 2007/09/10)
3863 NTP 4.2.4p3 (Harlan Stenn <stenn@ntp.org>, 2007/06/29)
3872 NTP 4.2.4p2 (Harlan Stenn <stenn@ntp.org>, 2007/06/19)
3877 an error in NTP packet handling on Windows that could lead to
3884 NTP 4.2.4 (Harlan Stenn <stenn@ntp.org>, 2006/12/31)
3896 K&R C is no longer supported as of NTP-4.2.4. We are now aiming for ANSI
3900 NTP 4.2.0 (Harlan Stenn <stenn@ntp.org>, 2003/10/15)
3904 NTP 4.2.8p17 (Harlan Stenn <stenn@ntp.org>, 2023 Jun 06)
3929 NTP 4.2.8p16 (Harlan Stenn <stenn@ntp.org>, 2023 May 30)
4052 NTP 4.2.8p15 (Harlan Stenn <stenn@ntp.org>, 2020 Jun 23)
4090 NTP 4.2.8p14 (Harlan Stenn <stenn@ntp.org>, 2020 Mar 03)
4198 NTP 4.2.8p13 (Harlan Stenn <stenn@ntp.org>, 2019 Mar 07)
4252 NTP 4.2.8p12 (Harlan Stenn <stenn@ntp.org>, 2018/14/09)
4323 NTP 4.2.8p11 (Harlan Stenn <stenn@ntp.org>, 2018/02/27)
4333 * NTP Bug 3454: Unauthenticated packet can reset authenticated interleaved
4343 The NTP Protocol allows for both non-authenticated and
4345 and several broadcast modes. In addition to the basic NTP
4360 Upgrade to 4.2.8p11, or later, from the NTP Project Download Page
4361 or the NTP Public Services Project Download Page.
4371 * NTP Bug 3453: Interleaved symmetric mode cannot recover from bad
4392 Upgrade to ntp-4.2.8p11 or later from the NTP Project Download Page
4393 or the NTP Public Services Project Download Page.
4401 * NTP Bug 3415: Provide a way to prevent authenticated symmetric passive
4426 Upgrade to ntp-4.2.8p11 or later from the NTP Project Download Page
4427 or the NTP Public Services Project Download Page.
4459 Upgrade to ntp-4.2.8p11 or later from the NTP Project Download Page
4460 or the NTP Public Services Project Download Page.
4464 * NTP Bug 3412: ctl_getitem(): buffer read overrun leads to undefined
4479 Upgrade to ntp-4.2.8p11 or later from the NTP Project Download Page
4480 or the NTP Public Services Project Download Page.
4487 * NTP Bug 3012: Sybil vulnerability: ephemeral association attack
4511 Upgrade to 4.2.8p11, or later, from the NTP Project Download Page or
4512 the NTP Public Services Project Download Page.
4539 [Bug 3435] anchor NTP era alignment <perlinger@ntp.org>
4557 [Bug 3399] NTP: linker error in 4.2.8p10 during Linux cross-compilation
4648 NTP 4.2.8p10 (Harlan Stenn <stenn@ntp.org>, 2017/03/21)
4657 * NTP-01-016 NTP: Denial of Service via Malformed Config (Medium)
4660 Affects: All versions of NTP-4, up to but not including ntp-4.2.8p10, and
4665 A vulnerability found in the NTP server makes it possible for an
4670 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page or
4671 the NTP Public Services Project Download Page
4677 * NTP-01-014 NTP: Buffer Overflow in DPTS Clock (Low)
4680 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and ntp-4.3.0 up to, but not including ntp-4.3.94.
4694 later, from the NTP Project Download Page or the NTP Public
4701 * NTP-01-012 NTP: Authenticated DoS via Malicious Config Option (Medium)
4709 A vulnerability found in the NTP server allows an authenticated
4716 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
4717 or the NTP Public Services Project Download Page
4723 * NTP-01-011 NTP: ntpq_stripquotes() returns incorrect value (Informational)
4726 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and
4731 The NTP Mode 6 monitoring and control client, ntpq, uses the
4743 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
4744 or the NTP Public Services Project Download Page
4750 * NTP-01-010 NTP: ereallocarray()/eallocarray() underused (Info)
4753 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and
4756 NTP makes use of several wrappers around the standard heap memory
4771 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
4772 or the NTP Public Services Project Download Page
4776 * NTP-01-009 NTP: Privileged execution of User Library code (WINDOWS
4795 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
4796 or the NTP Public Services Project Download Page
4800 * NTP-01-008 NTP: Stack Buffer Overflow from Command Line (WINDOWS
4810 The Windows installer for NTP calls strcat(), blindly appending
4821 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
4822 or the NTP Public Services Project Download Page
4826 * NTP-01-007 NTP: Data Structure terminated insufficiently (WINDOWS
4836 The Windows installer for NTP calls strcpy() with an argument
4846 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
4847 or the NTP Public Services Project Download Page
4851 * NTP-01-006 NTP: Copious amounts of Unused Code (Informational)
4890 NTP doesn't use, OK. But other packages used these libraries as
4899 * NTP-01-005 NTP: Off-by-one in Oncore GPS Receiver (Low)
4902 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and
4911 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page or
4912 the NTP Public Services Project Download Page
4918 * NTP-01-004 NTP: Potential Overflows in ctl_put() functions (Medium)
4921 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and
4936 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
4937 or the NTP Public Services Project Download Page
4945 * NTP-01-003 NTP: Improper use of snprintf() in mx4200_send() (Low)
4948 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and
4970 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
4971 or the NTP Public Services Project Download Page.
4977 * NTP-01-002 NTP: Buffer Overflow in ntpq when fetching reslist from a
4995 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
4996 or the NTP Public Services Project Download Page
5004 * NTP-01-001 NTP: Makefile does not enforce Security Flags (Informational)
5007 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and
5012 The build process for NTP has not, by default, provided compile
5015 flags for their builds. As of ntp-4.2.8p10, the NTP build
5018 is specific to NTP builds. It's inefficient to have every
5025 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
5026 or the NTP Public Services Project Download Page
5051 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page
5052 or the NTP Public Services Project Download Page
5095 * [Bug 3144] NTP does not build without openSSL. <perlinger@ntp.org>
5103 NTP 4.2.8p9 (Harlan Stenn <stenn@ntp.org>, 2016/11/21)
5130 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
5131 or the NTP Public Services Project Download Page
5155 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
5156 or the NTP Public Services Project Download Page
5169 The broadcast mode of NTP is expected to only be used in a
5173 functionality can be abused. An attacker with access to the NTP
5175 broadcast mode NTP packets into the broadcast domain which,
5177 mode packets from legitimate NTP broadcast servers.
5180 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
5181 or the NTP Public Services Project Download Page
5194 The broadcast mode of NTP is expected to only be used in a
5202 packet expires. An attacker with access to the NTP broadcast
5203 domain can send specially crafted broadcast mode NTP packets to
5205 cause ntpd to reject broadcast mode packets from legitimate NTP
5209 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
5210 or the NTP Public Services Project Download Page
5227 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
5228 or the NTP Public Services Project Download Page
5246 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
5247 or the NTP Public Services Project Download Page
5267 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
5268 or the NTP Public Services Project Download Page
5296 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
5297 or the NTP Public Services Project Download Page
5328 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
5329 or the NTP Public Services Project Download Page
5352 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page
5353 or the NTP Public Services Project Download Page
5367 * [Bug 3116] unit tests for NTP time stamp expansion. <perlinger@ntp.org>
5410 NTP 4.2.8p8 (Harlan Stenn <stenn@ntp.org>, 2016/06/02)
5429 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page
5430 or the NTP Public Services Project Download Page
5450 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page
5451 or the NTP Public Services Project Download Page
5468 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page
5469 or the NTP Public Services Project Download Page
5487 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page
5488 or the NTP Public Services Project Download Page
5503 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page
5504 or the NTP Public Services Project Download Page
5509 * [Bug 3038] NTP fails to build in VS2015. perlinger@ntp.org
5522 NTP 4.2.8p7 (Harlan Stenn <stenn@ntp.org>, 2016/04/26)
5528 When building NTP from source, there is a new configure option
5541 * Improve NTP security against buffer comparison timing attacks,
5555 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
5556 or the NTP Public Services Project Download Page.
5576 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
5577 or the NTP Public Services Project Download Page
5607 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
5608 or the NTP Public Services Project Download Page
5635 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
5636 or the NTP Public Services Project Download Page
5653 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
5654 or the NTP Public Services Project Download Page
5676 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
5677 or the NTP Public Services Project Download Page
5697 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
5698 or the NTP Public Services Project Download Page
5706 Affects: On a very limited number of OSes, all NTP releases up to but
5721 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
5722 or the NTP Public Services Project Download Page
5766 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page
5767 or the NTP Public Services Project Download Page. These
5799 * [Bug 2879] Improve NTP security against timing attacks. perlinger@ntp.org
5847 characteristics that are compatible with interleave mode, NTP will
5849 attacker can send a crafted forged packet to an NTP instance that
5858 This option controls whether or not NTP will, if conditions are right,
5863 NTP 4.2.8p6 (Harlan Stenn <stenn@ntp.org>, 2016/01/20)
5887 * Own a malicious NTP server that the client trusts
5888 * Prevent a legitimate NTP server from sending packets to
5891 and the NTP server
5893 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page
5894 or the NTP Public Services Project Download Page
5913 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page
5914 or the NTP Public Services Project Download Page.
5929 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page
5930 or the NTP Public Services Project Download Page.
5954 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page
5955 or the NTP Public Services Project Download Page.
5959 having smaller NTP broadcast domains.
5973 Upgrade to 4.2.8p6, or later, from NTP Project Download Page or
5974 the NTP Public Services Project Download Page.
6001 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page.
6003 build NTP with 'configure --disable-saveconfig' if you will
6027 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page
6028 or the NTP Public Services Project Download Page.
6055 upgrade to 4.2.8p6, or later, from the NTP Project Download
6056 Page or the NTP Public Services Project Download Page, and
6069 time servers will participate in an NTP broadcast domain,
6081 Summary: If an NTP network is configured for broadcast operations then
6086 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page
6087 or the NTP Public Services Project Download Page.
6116 NTP 4.2.8p5 (Harlan Stenn <stenn@ntp.org>, 2016/01/07)
6146 Upgrade to 4.2.8p5, or later, from the NTP Project Download
6147 Page or the NTP Public Services Project Download Page
6175 The NTP codebase has been undergoing regular Coverity scans on an
6216 NTP 4.2.8p4 (Harlan Stenn <stenn@ntp.org>, 2015/10/21)
6238 Upgrade to 4.2.8p4, or later, from the NTP Project Download
6239 Page or the NTP Public Services Project Download Page
6264 Upgrade to 4.2.8p4, or later, from the NTP Project Download Page
6265 or the NTP Public Services Project Download Page
6291 Upgrade to 4.2.8p4, or later, from the NTP Project Download
6292 Page or the NTP Public Services Project Download Page
6315 Upgrade to 4.2.8p4, or later, from the NTP Project Download
6316 Page or the NTP Public Services Project Download Page
6334 Upgrade to 4.2.8p4, or later, from the NTP Project Download
6335 Page or the NTP Public Services Project Download Page.
6360 Upgrade to 4.2.8p4, or later, from the NTP Project Download
6361 Page or the NTP Public Services Project Download Page.
6389 Upgrade to 4.2.8p4, or later, from the NTP Project Download
6390 Page or the NTP Public Services Project Download Page.
6415 Upgrade to 4.2.8p4, or later, from the NTP Project Download
6416 Page or the NTP Public Services Project Download Page.
6440 Upgrade to 4.2.8p4, or later, from the NTP Project Download
6441 Page or the NTP Public Services Project Download Page.
6470 Upgrade to 4.2.8p4, or later, from the NTP Project Download
6471 Page or the NTP Public Services Project Download Page.
6494 Upgrade to 4.2.8p4, or later, from the NTP Project Download
6495 Page or the NTP Public Services Project Download Page.
6519 Upgrade to 4.2.8p4, or later, from the NTP Project Download
6520 Page or the NTP Public Services Project Download Page.
6546 Upgrade to 4.2.8p4, or later, from the NTP Project Download
6547 Page or the NTP Public Services Project Download Page.
6643 * tests/libntp/sockaddrtest.h making it agree to NTP's conventions of formatting.
6675 * scripts/lib/NTP/Util.pm: stratum output is version-dependent. Harlan Stenn.
6711 NTP 4.2.8p3 (Harlan Stenn <stenn@ntp.org>, 2015/06/29)
6791 * [Bug 2822] New leap column in sntp broke NTP::Util.pm.
6860 NTP 4.2.8p2 (Harlan Stenn <stenn@ntp.org>, 2015/04/07)
6879 a remote NTP server/peer, it checks if the NTP message
6894 Upgrade to 4.2.8p2, or later, from the NTP Project Download Page
6895 or the NTP Public Services Project Download Page
6903 Affects: All NTP releases starting with at least xntp3.3wy up to but
6910 Summary: An attacker knowing that NTP hosts A and B are peering with
6912 with source address of B which will set the NTP state variables
6921 According to the document the NTP authentication is supposed to
6930 specifications, so other NTP implementations with support for
6932 An update to the NTP RFC to correct this error is in-process.
6934 Upgrade to 4.2.8p2, or later, from the NTP Project Download Page
6935 or the NTP Public Services Project Download Page
6958 * [Bug 2749] ntp/lib/NTP/Util.pm needs update for ntpq -w, IPv6, .POOL. .
7001 NTP 4.2.8p1 (Harlan Stenn <stenn@ntp.org>, 2015/02/04)
7021 Upgrade to 4.2.8p1, or later, from the NTP Project Download Page
7022 or the NTP Public Services Project Download Page.
7042 IPv6 interfaces. Since NTP's access control is based on source
7046 not really a bug in NTP, it's a problem with some OSes. If you
7050 Upgrade to 4.2.8p1, or later, from the NTP Project Download Page
7051 or the NTP Public Services Project Download Page
7061 NTP 4.2.8 (Harlan Stenn <stenn@ntp.org>, 2014/12/18)
7221 * Internal NTP Era counters
7272 NTP 4.2.6p5 (Harlan Stenn <stenn@ntp.org>, 2011/12/24)
7312 NTP 4.2.6p4 (Harlan Stenn <stenn@ntp.org>, 2011/09/22)
7375 NTP 4.2.6p3 (Harlan Stenn <stenn@ntp.org>, 2011/01/03)
7451 NTP 4.2.6p2 (Harlan Stenn <stenn@ntp.org>, 2010/07/08)
7490 NTP 4.2.6p1 (Harlan Stenn <stenn@ntp.org>, 2010/04/09)
7499 NTP 4.2.6 (Harlan Stenn <stenn@ntp.org>, 2009/12/08)
7504 NTP 4.2.4p8 (Harlan Stenn <stenn@ntp.org>, 2009/12/08)
7516 NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility.
7517 In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time
7546 NTP 4.2.4p7 (Harlan Stenn <stenn@ntp.org>, 2009/05/04)
7584 NTP 4.2.4p6 (Harlan Stenn <stenn@ntp.org>, 2009/01/07)
7596 the problem in NTP and telling us about it.
7600 NTP 4.2.4p5 (Harlan Stenn <stenn@ntp.org>, 2008/08/17)
7617 NTP 4.2.4p4 (Harlan Stenn <stenn@ntp.org>, 2007/09/10)
7629 NTP 4.2.4p3 (Harlan Stenn <stenn@ntp.org>, 2007/06/29)
7638 NTP 4.2.4p2 (Harlan Stenn <stenn@ntp.org>, 2007/06/19)
7643 an error in NTP packet handling on Windows that could lead to
7650 NTP 4.2.4 (Harlan Stenn <stenn@ntp.org>, 2006/12/31)
7662 K&R C is no longer supported as of NTP-4.2.4. We are now aiming for ANSI
7666 NTP 4.2.0 (Harlan Stenn <stenn@ntp.org>, 2003/10/15)