* CVE-2018-12327, bsc#1098531: fixed stack buffer overflow in
the openhost() command-line call of NTPQ/NTPDC.
* Further tweaks to improve the fix for CVE-2018-7170.
* ntp-usrgrp-resolver.patch was integrated upstream.
- Don't run autoreconf anymore and remove all related hacks and
BuildRequires.
OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=176
* CVE-2016-1549: Sybil vulnerability: ephemeral association
attack. While fixed in ntp-4.2.8p7, there are significant
additional protections for this issue in 4.2.8p11.
* CVE-2018-7182, bsc#1083426: ctl_getitem(): buffer read overrun
leads to undefined behavior and information leak.
* CVE-2018-7170, bsc#1083424: Multiple authenticated ephemeral
associations.
* CVE-2018-7184, bsc#1083422: Interleaved symmetric mode cannot
recover from bad state.
* CVE-2018-7185, bsc#1083420: Unauthenticated packet can reset
authenticated interleaved association.
* CVE-2018-7183, 1083417: ntpq:decodearr() can write beyond its
buffer limit.
* Obsoletes these patches: ntp-sntp-a.patch, ntp-warnings.patch
- Remove dead code from conf.start-ntpd (bsc#1082063).
- Don't use libevent's cached time stamps in sntp.
(bsc#1077445, ntp-sntp-libevent.patch)
OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=170