8ead51c56f
* Add further tweaks to improve the fix for CVE-2018-7170, bsc#1083424.
Reinhard Max2018-10-08 14:22:19 +00:00
ac5e76ff1f
* Add further tweaks to improve the fix for CVE-2018-7170, bsc#1083424.
Reinhard Max2018-10-08 14:22:19 +00:00
39680178a6
- Update to 4.2.8p12 * CVE-2018-12327, bsc#1098531: fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. * Further tweaks to improve the fix for CVE-2018-7170. * ntp-usrgrp-resolver.patch was integrated upstream. - Don't run autoreconf anymore and remove all related hacks and BuildRequires.
Reinhard Max2018-10-08 14:16:15 +00:00
1f337938cc
- Update to 4.2.8p12 * CVE-2018-12327, bsc#1098531: fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. * Further tweaks to improve the fix for CVE-2018-7170. * ntp-usrgrp-resolver.patch was integrated upstream. - Don't run autoreconf anymore and remove all related hacks and BuildRequires.
Reinhard Max2018-10-08 14:16:15 +00:00
a02eac2054
- Refactor the key handling in %post so that it does not overwrite user settings (bsc#1036505) and is more robust against ignored SIGPIPE (bsc#1090564).
Reinhard Max2018-04-24 15:43:29 +00:00
e33201ce24
- Refactor the key handling in %post so that it does not overwrite user settings (bsc#1036505) and is more robust against ignored SIGPIPE (bsc#1090564).
Reinhard Max2018-04-24 15:43:29 +00:00
e30cd939cd
- Update to 4.2.8p10 (bsc#1082210): * CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. * CVE-2018-7182, bsc#1083426: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. * CVE-2018-7170, bsc#1083424: Multiple authenticated ephemeral associations. * CVE-2018-7184, bsc#1083422: Interleaved symmetric mode cannot recover from bad state. * CVE-2018-7185, bsc#1083420: Unauthenticated packet can reset authenticated interleaved association. * CVE-2018-7183, 1083417: ntpq:decodearr() can write beyond its buffer limit. * Obsoletes these patches: ntp-sntp-a.patch, ntp-warnings.patch - Remove dead code from conf.start-ntpd (bsc#1082063). - Don't use libevent's cached time stamps in sntp. (bsc#1077445, ntp-sntp-libevent.patch)
Reinhard Max2018-03-06 13:22:11 +00:00
f1b86df421
- Update to 4.2.8p10 (bsc#1082210): * CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. * CVE-2018-7182, bsc#1083426: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. * CVE-2018-7170, bsc#1083424: Multiple authenticated ephemeral associations. * CVE-2018-7184, bsc#1083422: Interleaved symmetric mode cannot recover from bad state. * CVE-2018-7185, bsc#1083420: Unauthenticated packet can reset authenticated interleaved association. * CVE-2018-7183, 1083417: ntpq:decodearr() can write beyond its buffer limit. * Obsoletes these patches: ntp-sntp-a.patch, ntp-warnings.patch - Remove dead code from conf.start-ntpd (bsc#1082063). - Don't use libevent's cached time stamps in sntp. (bsc#1077445, ntp-sntp-libevent.patch)
Reinhard Max2018-03-06 13:22:11 +00:00
67c0b150be
- Add ntp-reproducible.patch to make build reproducible (boo#1047218)
Reinhard Max2017-12-29 10:43:34 +00:00
1d7a2d532a
- Add ntp-reproducible.patch to make build reproducible (boo#1047218)
Reinhard Max2017-12-29 10:43:34 +00:00
2d1d14a1c8
- Restart nptd if failed or aborted (FATE#315133). - Do not try to set the HW clock when adding a server at runtime to avoid blocking systemd.
Reinhard Max2017-12-21 14:11:33 +00:00
5d9828f57c
- Restart nptd if failed or aborted (FATE#315133). - Do not try to set the HW clock when adding a server at runtime to avoid blocking systemd.
Reinhard Max2017-12-21 14:11:33 +00:00
3d97b5f0a4
Accepting request 559102 from home:bmwiedemann:branches:network:time
Reinhard Max2017-12-21 14:08:36 +00:00
a8381cb40f
Accepting request 559102 from home:bmwiedemann:branches:network:time
Reinhard Max2017-12-21 14:08:36 +00:00
62581c705d
standard directory and causes problems for transactional updates (ntp-pathfind.patch)
Reinhard Max2017-03-02 13:06:09 +00:00
6492fe8dcd
standard directory and causes problems for transactional updates (ntp-pathfind.patch)
Reinhard Max2017-03-02 13:06:09 +00:00
6906571a54
- Move ntp-kod to /var/lib/ntp/db, because /var/db is not a standard directory and causes problems for transactional updates. ntp-pathfind.patch warnings (bsc#956365, ntp-pathfind.patch).
Reinhard Max2017-03-02 13:04:54 +00:00
57c9cd89e2
- Move ntp-kod to /var/lib/ntp/db, because /var/db is not a standard directory and causes problems for transactional updates. ntp-pathfind.patch warnings (bsc#956365, ntp-pathfind.patch).
Reinhard Max2017-03-02 13:04:54 +00:00
5d0e3b3f14
Accepting request 459516 from home:kukuk:branches:network:time
Reinhard Max2017-03-02 08:45:16 +00:00
e4abd50d9a
Accepting request 459516 from home:kukuk:branches:network:time
Reinhard Max2017-03-02 08:45:16 +00:00
58c0863644
- Remove 50-ntp.list (bsc#1011919). - Use system-wide libevent instead of local copy.
Reinhard Max2017-02-15 15:52:31 +00:00
af9ee6d539
- Remove 50-ntp.list (bsc#1011919). - Use system-wide libevent instead of local copy.
Reinhard Max2017-02-15 15:52:31 +00:00
b4d8a52d1b
- Simplify ntpd's search for its own executable to prevent AppArmor warnings (bsc#956365).
Reinhard Max2016-11-28 16:10:06 +00:00
a7217c84f4
- Simplify ntpd's search for its own executable to prevent AppArmor warnings (bsc#956365).
Reinhard Max2016-11-28 16:10:06 +00:00