SHA256
1
0
forked from pool/ntp

Commit Graph

  • 07df6f7877 Accepting request 768084 from network:time Dominique Leuenberger 2020-01-30 08:38:37 +00:00
  • 69e1cc5223 Accepting request 768084 from network:time Dominique Leuenberger 2020-01-30 08:38:37 +00:00
  • 87f696822a Accepting request 768067 from home:kukuk:branches:network:time Martin Pluskal 2020-01-28 16:14:17 +00:00
  • 495adb74ce Accepting request 768067 from home:kukuk:branches:network:time Martin Pluskal 2020-01-28 16:14:17 +00:00
  • 5ae4e68ff5 Accepting request 720097 from network:time Dominique Leuenberger 2019-08-07 11:54:17 +00:00
  • 261d4b5ece Accepting request 720097 from network:time Dominique Leuenberger 2019-08-07 11:54:17 +00:00
  • 210b5787c5 Accepting request 718254 from home:mgerstner:branches:network:time Martin Pluskal 2019-07-31 17:56:34 +00:00
  • b3f7e8d288 Accepting request 718254 from home:mgerstner:branches:network:time Martin Pluskal 2019-07-31 17:56:34 +00:00
  • c1ae19043f Accepting request 715673 from network:time Dominique Leuenberger 2019-07-29 15:24:29 +00:00
  • c3ca6a4a4c Accepting request 715673 from network:time Dominique Leuenberger 2019-07-29 15:24:29 +00:00
  • 04eac2c545 Accepting request 715455 from home:marxin:branches:openSUSE:Factory:Rings:1-MinimalX Reinhard Max 2019-07-16 12:08:06 +00:00
  • eb27dae87f Accepting request 715455 from home:marxin:branches:openSUSE:Factory:Rings:1-MinimalX Reinhard Max 2019-07-16 12:08:06 +00:00
  • d09099be31 Accepting request 709068 from network:time Dominique Leuenberger 2019-06-24 19:47:42 +00:00
  • 29932f3d48 Accepting request 709068 from network:time Dominique Leuenberger 2019-06-24 19:47:42 +00:00
  • 3903d1d6ad Accepting request 708087 from home:scarabeus_iv:branches:network:time Martin Pluskal 2019-06-11 07:51:05 +00:00
  • 9ca9889e55 Accepting request 708087 from home:scarabeus_iv:branches:network:time Martin Pluskal 2019-06-11 07:51:05 +00:00
  • a7d9813808 Accepting request 700033 from network:time Dominique Leuenberger 2019-05-03 20:26:48 +00:00
  • 92024ea0f4 Accepting request 700033 from network:time Dominique Leuenberger 2019-05-03 20:26:48 +00:00
  • fc26295742 Accepting request 695079 from home:kukuk:branches:network:time Martin Pluskal 2019-05-02 08:16:41 +00:00
  • 5ad52f29e0 Accepting request 695079 from home:kukuk:branches:network:time Martin Pluskal 2019-05-02 08:16:41 +00:00
  • c073ae22a7 Accepting request 684184 from network:time Dominique Leuenberger 2019-03-13 08:08:37 +00:00
  • 49b884d801 Accepting request 684184 from network:time Dominique Leuenberger 2019-03-13 08:08:37 +00:00
  • 68a3f48f2a - Update ro 4.2.8p13 * CVE-2019-8936, bsc#1128525: Crafted null dereference attack in authenticated mode 6 packet. * Fix several bugs in the BANCOMM reclock driver. * Fix ntp_loopfilter.c snprintf compilation warnings. * Fix spurious initgroups() error message. * Fix STA_NANO struct timex units. * Fix GPS week rollover in libparse. * Fix incorrect poll interval in packet. * Add a missing check for ENABLE_CMAC. Reinhard Max 2019-03-11 16:01:00 +00:00
  • 55430266aa - Update ro 4.2.8p13 * CVE-2019-8936, bsc#1128525: Crafted null dereference attack in authenticated mode 6 packet. * Fix several bugs in the BANCOMM reclock driver. * Fix ntp_loopfilter.c snprintf compilation warnings. * Fix spurious initgroups() error message. * Fix STA_NANO struct timex units. * Fix GPS week rollover in libparse. * Fix incorrect poll interval in packet. * Add a missing check for ENABLE_CMAC. Reinhard Max 2019-03-11 16:01:00 +00:00
  • 1f0f01859c Accepting request 678071 from home:fbui:branches:network:time Reinhard Max 2019-03-05 16:23:21 +00:00
  • 078996bcbc Accepting request 678071 from home:fbui:branches:network:time Reinhard Max 2019-03-05 16:23:21 +00:00
  • c68d67fc75 Accepting request 657615 from network:time Dominique Leuenberger 2018-12-26 23:23:16 +00:00
  • d61aa59084 Accepting request 657615 from network:time Dominique Leuenberger 2018-12-26 23:23:16 +00:00
  • 164c692fb3 Accepting request 656782 from home:fbui:branches:network:time Reinhard Max 2018-12-12 16:20:50 +00:00
  • e12f7c2c30 Accepting request 656782 from home:fbui:branches:network:time Reinhard Max 2018-12-12 16:20:50 +00:00
  • 9cd60aa87e Accepting request 640670 from network:time Dominique Leuenberger 2018-10-22 09:01:34 +00:00
  • dcc777dfa6 Accepting request 640670 from network:time Dominique Leuenberger 2018-10-22 09:01:34 +00:00
  • 8ead51c56f * Add further tweaks to improve the fix for CVE-2018-7170, bsc#1083424. Reinhard Max 2018-10-08 14:22:19 +00:00
  • ac5e76ff1f * Add further tweaks to improve the fix for CVE-2018-7170, bsc#1083424. Reinhard Max 2018-10-08 14:22:19 +00:00
  • 39680178a6 - Update to 4.2.8p12 * CVE-2018-12327, bsc#1098531: fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. * Further tweaks to improve the fix for CVE-2018-7170. * ntp-usrgrp-resolver.patch was integrated upstream. - Don't run autoreconf anymore and remove all related hacks and BuildRequires. Reinhard Max 2018-10-08 14:16:15 +00:00
  • 1f337938cc - Update to 4.2.8p12 * CVE-2018-12327, bsc#1098531: fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. * Further tweaks to improve the fix for CVE-2018-7170. * ntp-usrgrp-resolver.patch was integrated upstream. - Don't run autoreconf anymore and remove all related hacks and BuildRequires. Reinhard Max 2018-10-08 14:16:15 +00:00
  • 7cdf668f58 Accepting request 601632 from network:time Dominique Leuenberger 2018-04-30 20:52:21 +00:00
  • 3c7e4d4942 Accepting request 601632 from network:time Dominique Leuenberger 2018-04-30 20:52:21 +00:00
  • 2b8a9e04ea OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=175 Reinhard Max 2018-04-26 15:05:01 +00:00
  • 0e866056fb OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=175 Reinhard Max 2018-04-26 15:05:01 +00:00
  • a02eac2054 - Refactor the key handling in %post so that it does not overwrite user settings (bsc#1036505) and is more robust against ignored SIGPIPE (bsc#1090564). Reinhard Max 2018-04-24 15:43:29 +00:00
  • e33201ce24 - Refactor the key handling in %post so that it does not overwrite user settings (bsc#1036505) and is more robust against ignored SIGPIPE (bsc#1090564). Reinhard Max 2018-04-24 15:43:29 +00:00
  • 19d2c6cd6a Accepting request 592537 from network:time Dominique Leuenberger 2018-04-01 15:25:23 +00:00
  • 8219e515c0 Accepting request 592537 from network:time Dominique Leuenberger 2018-04-01 15:25:23 +00:00
  • 7712413935 Accepting request 588327 from home:cboltz:branches:network:time Martin Pluskal 2018-03-30 09:46:13 +00:00
  • 95c93244ce Accepting request 588327 from home:cboltz:branches:network:time Martin Pluskal 2018-03-30 09:46:13 +00:00
  • 508e35c19c Accepting request 586702 from network:time Dominique Leuenberger 2018-03-19 22:31:09 +00:00
  • 4eb2031d4a Accepting request 586702 from network:time Dominique Leuenberger 2018-03-19 22:31:09 +00:00
  • 2e183e96a3 Fix typo in changes Reinhard Max 2018-03-14 09:03:19 +00:00
  • 306558346d Fix typo in changes Reinhard Max 2018-03-14 09:03:19 +00:00
  • d92efc6e57 - Update to 4.2.8p11 (bsc#1082210): Reinhard Max 2018-03-06 15:52:20 +00:00
  • 13b67f523e - Update to 4.2.8p11 (bsc#1082210): Reinhard Max 2018-03-06 15:52:20 +00:00
  • e30cd939cd - Update to 4.2.8p10 (bsc#1082210): * CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. * CVE-2018-7182, bsc#1083426: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. * CVE-2018-7170, bsc#1083424: Multiple authenticated ephemeral associations. * CVE-2018-7184, bsc#1083422: Interleaved symmetric mode cannot recover from bad state. * CVE-2018-7185, bsc#1083420: Unauthenticated packet can reset authenticated interleaved association. * CVE-2018-7183, 1083417: ntpq:decodearr() can write beyond its buffer limit. * Obsoletes these patches: ntp-sntp-a.patch, ntp-warnings.patch - Remove dead code from conf.start-ntpd (bsc#1082063). - Don't use libevent's cached time stamps in sntp. (bsc#1077445, ntp-sntp-libevent.patch) Reinhard Max 2018-03-06 13:22:11 +00:00
  • f1b86df421 - Update to 4.2.8p10 (bsc#1082210): * CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. * CVE-2018-7182, bsc#1083426: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. * CVE-2018-7170, bsc#1083424: Multiple authenticated ephemeral associations. * CVE-2018-7184, bsc#1083422: Interleaved symmetric mode cannot recover from bad state. * CVE-2018-7185, bsc#1083420: Unauthenticated packet can reset authenticated interleaved association. * CVE-2018-7183, 1083417: ntpq:decodearr() can write beyond its buffer limit. * Obsoletes these patches: ntp-sntp-a.patch, ntp-warnings.patch - Remove dead code from conf.start-ntpd (bsc#1082063). - Don't use libevent's cached time stamps in sntp. (bsc#1077445, ntp-sntp-libevent.patch) Reinhard Max 2018-03-06 13:22:11 +00:00
  • 28fa19fb11 Accepting request 561845 from network:time Dominique Leuenberger 2018-01-16 08:24:07 +00:00
  • f7d2cefb2e Accepting request 561845 from network:time Dominique Leuenberger 2018-01-16 08:24:07 +00:00
  • 67c0b150be - Add ntp-reproducible.patch to make build reproducible (boo#1047218) Reinhard Max 2017-12-29 10:43:34 +00:00
  • 1d7a2d532a - Add ntp-reproducible.patch to make build reproducible (boo#1047218) Reinhard Max 2017-12-29 10:43:34 +00:00
  • 2d1d14a1c8 - Restart nptd if failed or aborted (FATE#315133). - Do not try to set the HW clock when adding a server at runtime to avoid blocking systemd. Reinhard Max 2017-12-21 14:11:33 +00:00
  • 5d9828f57c - Restart nptd if failed or aborted (FATE#315133). - Do not try to set the HW clock when adding a server at runtime to avoid blocking systemd. Reinhard Max 2017-12-21 14:11:33 +00:00
  • 3d97b5f0a4 Accepting request 559102 from home:bmwiedemann:branches:network:time Reinhard Max 2017-12-21 14:08:36 +00:00
  • a8381cb40f Accepting request 559102 from home:bmwiedemann:branches:network:time Reinhard Max 2017-12-21 14:08:36 +00:00
  • 7bf2548f47 Accepting request 545184 from network:time Dominique Leuenberger 2017-11-30 11:41:12 +00:00
  • bb6d81e957 Accepting request 545184 from network:time Dominique Leuenberger 2017-11-30 11:41:12 +00:00
  • 76a1c245fc Accepting request 544753 from home:RBrownSUSE:branches:network:time Reinhard Max 2017-11-24 12:58:23 +00:00
  • 6704a8562e Accepting request 544753 from home:RBrownSUSE:branches:network:time Reinhard Max 2017-11-24 12:58:23 +00:00
  • f34f55aef7 Accepting request 486156 from network:time Yuchen Lin 2017-04-11 10:40:07 +00:00
  • 56bdfac4d5 Accepting request 486156 from network:time Yuchen Lin 2017-04-11 10:40:07 +00:00
  • f22d02700e - Enable experimental leap smearing (fate#321003). See /usr/share/doc/packages/ntp/README.leapsmear for details. Reinhard Max 2017-04-06 13:57:43 +00:00
  • f4007a52b0 - Enable experimental leap smearing (fate#321003). See /usr/share/doc/packages/ntp/README.leapsmear for details. Reinhard Max 2017-04-06 13:57:43 +00:00
  • e6f6080277 Accepting request 486150 from home:aeneas_jaissle:branches:network:time Reinhard Max 2017-04-06 13:55:07 +00:00
  • 42e6c31d85 Accepting request 486150 from home:aeneas_jaissle:branches:network:time Reinhard Max 2017-04-06 13:55:07 +00:00
  • 522b006207 OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=163 Reinhard Max 2017-03-24 16:03:10 +00:00
  • d5811f6e66 OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=163 Reinhard Max 2017-03-24 16:03:10 +00:00
  • bf90adae4c - Move ntp-kod to /var/lib/ntp, because /var/db is not a Reinhard Max 2017-03-24 15:41:36 +00:00
  • e84bd1f886 - Move ntp-kod to /var/lib/ntp, because /var/db is not a Reinhard Max 2017-03-24 15:41:36 +00:00
  • 2b44453e1e - Update to 4.2.8p10 (bsc#1030050): * Sec 3389 / CVE-2017-6464 / VU#325339: NTP-01-016 NTP: Denial of Service via Malformed Config * Sec 3388 / CVE-2017-6462 / VU#325339: NTP-01-014 NTP: Buffer Overflow in DPTS Clock * Sec 3387 / CVE-2017-6463 / VU#325339: NTP-01-012 NTP: Authenticated DoS via Malicious Config Option * Sec 3386: NTP-01-011 NTP: ntpq_stripquotes() returns incorrect Value * Sec 3385: NTP-01-010 NTP: ereallocarray()/eallocarray() underused * Sec 3381: NTP-01-006 NTP: Copious amounts of Unused Code * Sec 3380: NTP-01-005 NTP: Off-by-one in Oncore GPS Receiver * Sec 3379 / CVE-2017-6458 / VU#325339: NTP-01-004 NTP: Potential Overflows in ctl_put() functions * Sec 3378 / CVE-2017-6451 / VU#325339: NTP-01-003 Improper use of snprintf() in mx4200_send() * Sec 3377 / CVE-2017-6460 / VU#325339: NTP-01-002 Buffer Overflow in ntpq when fetching reslist * Sec 3376: NTP-01-001 Makefile does not enforce Security Flags * Sec 3361 / CVE-2016-9042 / VU#325339: 0rigin (zero origin) DoS. * [Bug 3393] clang scan-build findings * [Bug 3363] Support for openssl-1.1.0 without compatibility modes * [Bug 3356] Bugfix 3072 breaks multicastclient * [Bug 3173] forking async worker: interrupted pipe I/O * [Bug 3139] (...) time_pps_create: Exec format error * [Bug 3107] Incorrect Logic for Peer Event Limiting * [Bug 3062] Change the process name of forked DNS worker * [Bug 2923] Trap Configuration Fail * [Bug 2896] Nothing happens if minsane < maxclock < minclock Reinhard Max 2017-03-23 17:29:11 +00:00
  • 6639d76586 - Update to 4.2.8p10 (bsc#1030050): * Sec 3389 / CVE-2017-6464 / VU#325339: NTP-01-016 NTP: Denial of Service via Malformed Config * Sec 3388 / CVE-2017-6462 / VU#325339: NTP-01-014 NTP: Buffer Overflow in DPTS Clock * Sec 3387 / CVE-2017-6463 / VU#325339: NTP-01-012 NTP: Authenticated DoS via Malicious Config Option * Sec 3386: NTP-01-011 NTP: ntpq_stripquotes() returns incorrect Value * Sec 3385: NTP-01-010 NTP: ereallocarray()/eallocarray() underused * Sec 3381: NTP-01-006 NTP: Copious amounts of Unused Code * Sec 3380: NTP-01-005 NTP: Off-by-one in Oncore GPS Receiver * Sec 3379 / CVE-2017-6458 / VU#325339: NTP-01-004 NTP: Potential Overflows in ctl_put() functions * Sec 3378 / CVE-2017-6451 / VU#325339: NTP-01-003 Improper use of snprintf() in mx4200_send() * Sec 3377 / CVE-2017-6460 / VU#325339: NTP-01-002 Buffer Overflow in ntpq when fetching reslist * Sec 3376: NTP-01-001 Makefile does not enforce Security Flags * Sec 3361 / CVE-2016-9042 / VU#325339: 0rigin (zero origin) DoS. * [Bug 3393] clang scan-build findings * [Bug 3363] Support for openssl-1.1.0 without compatibility modes * [Bug 3356] Bugfix 3072 breaks multicastclient * [Bug 3173] forking async worker: interrupted pipe I/O * [Bug 3139] (...) time_pps_create: Exec format error * [Bug 3107] Incorrect Logic for Peer Event Limiting * [Bug 3062] Change the process name of forked DNS worker * [Bug 2923] Trap Configuration Fail * [Bug 2896] Nothing happens if minsane < maxclock < minclock Reinhard Max 2017-03-23 17:29:11 +00:00
  • f90b43a5e6 Accepting request 480781 from network:time Dominique Leuenberger 2017-03-21 21:45:04 +00:00
  • 3ebda1f571 Accepting request 480781 from network:time Dominique Leuenberger 2017-03-21 21:45:04 +00:00
  • 5a21723a6c Accepting request 461929 from network:time Dominique Leuenberger 2017-03-11 14:17:30 +00:00
  • fa043246c0 Accepting request 461929 from network:time Dominique Leuenberger 2017-03-11 14:17:30 +00:00
  • c313c619d8 - Fix a problem with multicast clients. (bsc#1018940, ntp-unbreak-multicast.patch) Reinhard Max 2017-03-10 08:43:14 +00:00
  • d682ac9228 - Fix a problem with multicast clients. (bsc#1018940, ntp-unbreak-multicast.patch) Reinhard Max 2017-03-10 08:43:14 +00:00
  • 49cb8a6dfa (ntp-move-kod-file.patch) Reinhard Max 2017-03-02 13:13:53 +00:00
  • b04fcf3c0b (ntp-move-kod-file.patch) Reinhard Max 2017-03-02 13:13:53 +00:00
  • 62581c705d standard directory and causes problems for transactional updates (ntp-pathfind.patch) Reinhard Max 2017-03-02 13:06:09 +00:00
  • 6492fe8dcd standard directory and causes problems for transactional updates (ntp-pathfind.patch) Reinhard Max 2017-03-02 13:06:09 +00:00
  • 6906571a54 - Move ntp-kod to /var/lib/ntp/db, because /var/db is not a standard directory and causes problems for transactional updates. ntp-pathfind.patch warnings (bsc#956365, ntp-pathfind.patch). Reinhard Max 2017-03-02 13:04:54 +00:00
  • 57c9cd89e2 - Move ntp-kod to /var/lib/ntp/db, because /var/db is not a standard directory and causes problems for transactional updates. ntp-pathfind.patch warnings (bsc#956365, ntp-pathfind.patch). Reinhard Max 2017-03-02 13:04:54 +00:00
  • 5d0e3b3f14 Accepting request 459516 from home:kukuk:branches:network:time Reinhard Max 2017-03-02 08:45:16 +00:00
  • e4abd50d9a Accepting request 459516 from home:kukuk:branches:network:time Reinhard Max 2017-03-02 08:45:16 +00:00
  • 58c0863644 - Remove 50-ntp.list (bsc#1011919). - Use system-wide libevent instead of local copy. Reinhard Max 2017-02-15 15:52:31 +00:00
  • af9ee6d539 - Remove 50-ntp.list (bsc#1011919). - Use system-wide libevent instead of local copy. Reinhard Max 2017-02-15 15:52:31 +00:00
  • b4d8a52d1b - Simplify ntpd's search for its own executable to prevent AppArmor warnings (bsc#956365). Reinhard Max 2016-11-28 16:10:06 +00:00
  • a7217c84f4 - Simplify ntpd's search for its own executable to prevent AppArmor warnings (bsc#956365). Reinhard Max 2016-11-28 16:10:06 +00:00
  • e60bddb259 Accepting request 441452 from network:time Dominique Leuenberger 2016-11-25 11:02:25 +00:00
  • b2f7a982b7 Accepting request 441452 from network:time Dominique Leuenberger 2016-11-25 11:02:25 +00:00
  • 7a2805aa9c - Update to 4.2.8p9: * CVE-2016-9311: Trap crash. * CVE-2016-9310: Mode 6 unauthenticated trap information disclosure and DDoS vector. * CVE-2016-7427: Broadcast Mode Replay Prevention DoS. * CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS. * CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass. * CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal(). * CVE-2016-7429: Interface selection attack. * CVE-2016-7426: Client rate limiting and server responses. * CVE-2016-7433: Reboot sync calculation problem. * Fix a spurious error message (obsoletes ntp-sigchld.patch). * Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog. - Fix a regression in "trap" (bsc#981252, ntp-trap.patch). - Reduce the number of netlink groups to listen on for changes to the local network setup (bsc#992606, ntp-netlink.patch). - Fix segfault in "sntp -a" (bnc#1009434, ntp-sntp-a.patch). - Silence an OpenSSL version warning (bsc#992038, ntp-openssl-version.patch). Reinhard Max 2016-11-22 16:24:33 +00:00
  • f043cc92ba - Update to 4.2.8p9: * CVE-2016-9311: Trap crash. * CVE-2016-9310: Mode 6 unauthenticated trap information disclosure and DDoS vector. * CVE-2016-7427: Broadcast Mode Replay Prevention DoS. * CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS. * CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass. * CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal(). * CVE-2016-7429: Interface selection attack. * CVE-2016-7426: Client rate limiting and server responses. * CVE-2016-7433: Reboot sync calculation problem. * Fix a spurious error message (obsoletes ntp-sigchld.patch). * Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog. - Fix a regression in "trap" (bsc#981252, ntp-trap.patch). - Reduce the number of netlink groups to listen on for changes to the local network setup (bsc#992606, ntp-netlink.patch). - Fix segfault in "sntp -a" (bnc#1009434, ntp-sntp-a.patch). - Silence an OpenSSL version warning (bsc#992038, ntp-openssl-version.patch). Reinhard Max 2016-11-22 16:24:33 +00:00