| Commit message (Collapse) | Author | Age | Files | Lines |
|\
| |
| |
| |
| |
| | |
MFC: 3 days
Merge commit '1f833b3fc9968c3dd7ed79ccf0525ebf16c891ad' into main
|
|\|
| |
| |
| |
| | |
Security: NtpBUg3767, NtpBug3808, NtpBug3807 (CVE-2023-26555)
MFC after: immediately
|
|\|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Update 4.2.8p14 --> 4.2.8p15
Summary: Systems that use a CMAC algorithm in ntp.keys will not release
a bit of memory on each packet that uses a CMAC keyid, eventually causing
ntpd to run out of memory and fail. The CMAC cleanup from
https://bugs.ntp.org/3447, part of ntp-4.2.8p11, introduced a bug whereby
the CMAC data structure was no longer completely removed.
MFC after: 3 days
Security: NTP Bug 3661
Notes:
svn path=/head/; revision=362568
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Only a small nit here: psl should be declared extern and defined exactly
once.
-fno-common will become the default in GCC10/LLVM11.
MFC after: 3 days
Notes:
svn path=/head/; revision=359676
|
|\|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Update ntp-4.2.8p13 --> 4.2.8p14.
The advisory can be found at:
http://support.ntp.org/bin/view/Main/SecurityNotice#\
March_2020_ntp_4_2_8p14_NTP_Rele
No CVEs have been documented yet.
MFC after: now
Security: http://support.ntp.org/bin/view/Main/NtpBug3610
http://support.ntp.org/bin/view/Main/NtpBug3596
http://support.ntp.org/bin/view/Main/NtpBug3592
Notes:
svn path=/head/; revision=358652
|
|\|
| |
| |
| | |
Notes:
svn path=/head/; revision=330104
|
|\|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Security: VuXML: c4a18a12-77fc-11e5-a687-206a8a720317
Security: CVE-2015-7871
Security: CVE-2015-7855
Security: CVE-2015-7854
Security: CVE-2015-7853
Security: CVE-2015-7852
Security: CVE-2015-7851
Security: CVE-2015-7850
Security: CVE-2015-7849
Security: CVE-2015-7848
Security: CVE-2015-7701
Security: CVE-2015-7703
Security: CVE-2015-7704, CVE-2015-7705
Security: CVE-2015-7691, CVE-2015-7692, CVE-2015-7702
Security: http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_Security_Vulner
Sponsored by: Nginx, Inc.
Notes:
svn path=/head/; revision=289764
|
|\|
| |
| |
| |
| |
| |
| |
| |
| | |
Thanks to roberto for providing pointers to wedge this into HEAD.
Approved by: roberto
Notes:
svn path=/head/; revision=280849
|
|\|
| |
| |
| |
| |
| |
| |
| |
| | |
will update usr.sbin/ntp to match this.
MFC after: 2 weeks
Notes:
svn path=/head/; revision=182007
|
|/
|
|
| |
Notes:
svn path=/vendor/ntp/dist/; revision=181800
|
|
|
|
| |
Notes:
svn path=/vendor/ntp/dist/; revision=132451
|
|
Notes:
svn path=/vendor/ntp/dist/; revision=82498
|