<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test2, branch vendor/ntp/4.2.8</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test2/atom?h=vendor%2Fntp%2F4.2.8</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test2/atom?h=vendor%2Fntp%2F4.2.8'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/'/>
<updated>2014-12-20T22:52:39Z</updated>
<entry>
<title>Vendor import ntp 4.2.8.</title>
<updated>2014-12-20T22:52:39Z</updated>
<author>
<name>Cy Schubert</name>
<email>cy@FreeBSD.org</email>
</author>
<published>2014-12-20T22:52:39Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=b5e14a1344528861a7016aa2c6b0f2e9630d1526'/>
<id>urn:sha1:b5e14a1344528861a7016aa2c6b0f2e9630d1526</id>
<content type='text'>
Reviewed by:	roberto
Security:	VUXML: 4033d826-87dd-11e4-9079-3c970e169bc2
Security:	http://www.kb.cert.org/vuls/id/852879
Security:	CVE-2014-9293
Security	CVE-2014-9294
Security	CVE-2014-9295
Security	CVE-2014-9296
</content>
</entry>
<entry>
<title>Virgin import of ntpd 4.2.6p5.</title>
<updated>2013-12-04T21:33:17Z</updated>
<author>
<name>Ollivier Robert</name>
<email>roberto@FreeBSD.org</email>
</author>
<published>2013-12-04T21:33:17Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=2b45e011ca352ce509bc83ae148230aeee0c7e0d'/>
<id>urn:sha1:2b45e011ca352ce509bc83ae148230aeee0c7e0d</id>
<content type='text'>
When the series of commits is complete, things like
https://cert.litnet.lt/en/docs/ntp-distributed-reflection-dos-attacks
should be fixed.

PR:		bin/148836 (except that we import a newer version)
Asked by:	Too many
MFC after:	2 weeks
</content>
</entry>
<entry>
<title>Record the two ntp bugfixes that can be dropped when updating to</title>
<updated>2011-06-29T13:06:42Z</updated>
<author>
<name>Bjoern A. Zeeb</name>
<email>bz@FreeBSD.org</email>
</author>
<published>2011-06-29T13:06:42Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=9b5bd0a264b0a21eefac2b929b574c73bd601507'/>
<id>urn:sha1:9b5bd0a264b0a21eefac2b929b574c73bd601507</id>
<content type='text'>
later versions of ntp.

Discussed with:	roberto
</content>
</entry>
<entry>
<title>Mention r222444, NTP bug 1936 we locally fixed already to be considered</title>
<updated>2011-05-29T07:44:24Z</updated>
<author>
<name>Bjoern A. Zeeb</name>
<email>bz@FreeBSD.org</email>
</author>
<published>2011-05-29T07:44:24Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=a851a10842776d415647e3d18f12235379b3264e'/>
<id>urn:sha1:a851a10842776d415647e3d18f12235379b3264e</id>
<content type='text'>
on next update(s).

Requested by:	roberto
</content>
</entry>
<entry>
<title>Update ntp vendor code to 4.2.4p8.</title>
<updated>2009-12-12T22:29:30Z</updated>
<author>
<name>Ollivier Robert</name>
<email>roberto@FreeBSD.org</email>
</author>
<published>2009-12-12T22:29:30Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=7e3cc4cfce9ff7e0fc29d513031dde00267eb05c'/>
<id>urn:sha1:7e3cc4cfce9ff7e0fc29d513031dde00267eb05c</id>
<content type='text'>
This is mainly to fix CVE-2009-3563, a remote DOS.

MFC after:	3 days
Security:	CVE-2009-3563
</content>
</entry>
<entry>
<title>Prevent a buffer overflow in ntpq.  Patch taken from the PR database</title>
<updated>2009-04-19T23:34:52Z</updated>
<author>
<name>Ollivier Robert</name>
<email>roberto@FreeBSD.org</email>
</author>
<published>2009-04-19T23:34:52Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=8c0610b9602c2bdb6f856c0808ad655599ad68f6'/>
<id>urn:sha1:8c0610b9602c2bdb6f856c0808ad655599ad68f6</id>
<content type='text'>
after being committed to the official ntp tree and present in 4.2.4p7-rc2.

It will be MFH to the upcoming 7.2 pending re approval.

Obtained from:	https://support.ntp.org/bugs/show_bug.cgi?id=1144
MFC after:	    3 days
Security:	    http://www.securityfocus.com/bid/34481
                CVE-2009-0159
</content>
</entry>
<entry>
<title>Re-apply patch from bin/92839 to avoid two possible buffer overflows.  For an</title>
<updated>2008-09-07T22:08:10Z</updated>
<author>
<name>Ollivier Robert</name>
<email>roberto@FreeBSD.org</email>
</author>
<published>2008-09-07T22:08:10Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=a3275ecc3f255ee9ae2e95324b0c6f1709699789'/>
<id>urn:sha1:a3275ecc3f255ee9ae2e95324b0c6f1709699789</id>
<content type='text'>
unknown reason, this seems to have never been applied to vendor sources.

PR:		bin/92839
Submitted by:	Helge Oldach &lt;freebsdntpd@oldach.net&gt;
</content>
</entry>
<entry>
<title>Update instructions with svn usage.</title>
<updated>2008-08-18T14:41:31Z</updated>
<author>
<name>Ollivier Robert</name>
<email>roberto@FreeBSD.org</email>
</author>
<published>2008-08-18T14:41:31Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=f1c13ed37419f9172a98c30326ee06364c703b7e'/>
<id>urn:sha1:f1c13ed37419f9172a98c30326ee06364c703b7e</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Move FREEBSD-upgrade as well.</title>
<updated>2008-08-18T14:37:44Z</updated>
<author>
<name>Ollivier Robert</name>
<email>roberto@FreeBSD.org</email>
</author>
<published>2008-08-18T14:37:44Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=e1e2a2059117d6d3d69f8d70ec7d52138711719d'/>
<id>urn:sha1:e1e2a2059117d6d3d69f8d70ec7d52138711719d</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Move FREEBSD-Xlist in a more proper location.</title>
<updated>2008-08-18T14:36:57Z</updated>
<author>
<name>Ollivier Robert</name>
<email>roberto@FreeBSD.org</email>
</author>
<published>2008-08-18T14:36:57Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=0f58a72abb7c4a05ef558bc315dcfdc0806b7da6'/>
<id>urn:sha1:0f58a72abb7c4a05ef558bc315dcfdc0806b7da6</id>
<content type='text'>
</content>
</entry>
</feed>
