Dear freshmeat.net subscriber,
kostecke just announced version 4.2.4p7 of NTP on freshmeat.net.
The changes are as follows:
This release fixes CVE-2009-1252, "Remote exploit if autokey is enabled", a
high-severity vulnerability that only affects users of Autokey Authentication.
It fixes two low-severity vulnerabilities: CVE-2009-0159, a limited (two byte)
buffer overflow in ntpq, and non-exclusive socket utilization on Windows. This
release also includes improved logging, fixes and improvements for Windows,
MacOS X, and Solaris, and support for AIX 6.1. This is a strongly recommended
The Network Time Protocol (NTP) is used to synchronize the time of a computer
client or server to another server or reference time source, such as a radio or
satellite receiver or modem. It provides client accuracies typically within a
millisecond on LANs and up to a few tens of milliseconds on WANs relative to a
primary server synchronized to Coordinated Universal Time (UTC) via a Global
Positioning Service (GPS) receiver, for example.
Detailed history and release notes are available here:
If you want to change your subscription to this project, please log in to: