This website requires JavaScript.
86c7b5d452
Accepting request 1183214 from network:time
factory
Ana Guerrero
2024-06-25 21:09:38 +00:00
a5461e62bf
- Drop initscripts-legacy support [jsc#PED264] - Drop rc<service> symlinks [jsc#PED-264], [jsc#PED-266]
devel
Reinhard Max
2024-06-25 14:29:09 +00:00
5f7e8e152a
Accepting request 1171234 from network:time
Ana Guerrero
2024-05-02 21:47:38 +00:00
dbf6becadc
Accepting request 1170274 from home:msmeissn:branches:network:time
Reinhard Max
2024-05-02 07:14:55 +00:00
83690dd038
Accepting request 1151690 from network:time
Ana Guerrero
2024-02-26 18:48:29 +00:00
faeacc323d
Accepting request 1149485 from home:dimstar:rpm4.20:n
Reinhard Max
2024-02-26 13:56:02 +00:00
73792d2116
Accepting request 1092906 from network:time
Dominique Leuenberger
2023-06-14 14:29:24 +00:00
6b06742518
- Update to 4.2.8p17: * Fix some regressions of 4.2.8p16 - Update to 4.2.8p16: * [Sec 3808] Assertion failure in ntpq on malformed RT-11 date * [Sec 3807], bsc#1210390, CVE-2023-26555: praecis_parse() in the Palisade refclock driver has a hypothetical input buffer overflow. * [Sec 3767] An OOB KoD RATE value triggers an assertion when debug is enabled. * Obsoletes: ntp-CVE-2023-26551.patch, ntp-sntp-dst.patch, ntp-ENOBUFS.patch * Multiple bug fixes and improvements. For details, see: /usr/share/doc/packages/ntp/ChangeLog http://www.ntp.org/support/securitynotice/4_2_8-series-changelog/ - Follow upstream's suggestion to build with debugging disabled: https://www.ntp.org/support/securitynotice/ntpbug3767/
Reinhard Max
2023-06-07 16:38:34 +00:00
df25852d61
Accepting request 1085150 from network:time
Dominique Leuenberger
2023-05-06 20:09:41 +00:00
17b610661f
- bsc#1210386: out-of-bounds writes in mstolfp() * CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554 * Add ntp-CVE-2023-26551.patch
Reinhard Max
2023-05-05 14:04:05 +00:00
61aa8d8726
Accepting request 1064283 from network:time
Dominique Leuenberger
2023-02-11 20:57:02 +00:00
b0b1c14714
- bsc#1208004: Make %post script SELinux aware
Reinhard Max
2023-02-08 12:18:33 +00:00
868bfd172b
Accepting request 1062463 from network:time
Dominique Leuenberger
2023-02-02 17:08:21 +00:00
7108e6d97b
Accepting request 1061819 from home:dirkmueller:Factory
Reinhard Max
2023-02-01 14:16:51 +00:00
51bc776d2d
Accepting request 1061308 from network:time
Dominique Leuenberger
2023-01-27 09:16:27 +00:00
32668bb198
- boo#1207577: set /var/lib/ntp/var/run/ntp to 775
Reinhard Max
2023-01-26 16:46:37 +00:00
8453342cfd
Accepting request 957220 from network:time
Dominique Leuenberger
2022-02-24 17:20:57 +00:00
85652f99a5
Accepting request 957171 from home:JonathanKang:branches:network:time
Reinhard Max
2022-02-24 07:15:18 +00:00
2069391eb7
osc copypac from project:openSUSE:Factory package:ntp revision:131
Martin Pluskal
2022-01-17 07:01:36 +00:00
4cfa0b2d18
OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=207
Martin Pluskal
2022-01-17 07:00:34 +00:00
963e2284df
Accepting request 924903 from network:time
Dominique Leuenberger
2021-10-12 19:49:57 +00:00
dadd8c60c2
Accepting request 924895 from home:jsegitz:branches:systemdhardening:network:time
Reinhard Max
2021-10-12 14:21:49 +00:00
8d5ebb3d44
Accepting request 900200 from network:time
Dominique Leuenberger
2021-06-16 18:34:42 +00:00
d2408a48b9
- bsc#1186431: Fix a typo in %post .
Reinhard Max
2021-06-15 16:14:39 +00:00
c58dc2f885
Accepting request 894615 from network:time
Dominique Leuenberger
2021-05-20 17:25:40 +00:00
8f39992171
- jsc#SLE-15482, ntp-clarify-interface.patch: Adjust the documentation to clarify that "interface ignore all" does not cover the wildcard and localhost addresses.
Reinhard Max
2021-05-20 11:05:53 +00:00
3516295272
Accepting request 883348 from network:time
Richard Brown
2021-04-10 13:27:06 +00:00
2e451d125d
Accepting request 882619 from home:ykurlaev:branches:network:time
Reinhard Max
2021-04-06 14:56:01 +00:00
5e160005e6
Accepting request 876223 from network:time
Richard Brown
2021-03-03 17:34:17 +00:00
c7f5509253
- Disown /var/lib/ntp, it is now part of the sysuser-ntp package.
Reinhard Max
2021-03-02 12:50:41 +00:00
dbd826a216
Accepting request 871212 from network:time
Dominique Leuenberger
2021-02-17 17:12:14 +00:00
4cc9942b2f
OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=199
Reinhard Max
2021-02-11 13:14:43 +00:00
2519fca491
OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=198
Reinhard Max
2021-02-11 11:45:01 +00:00
17db83c0b4
OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=197
Reinhard Max
2021-02-11 11:42:52 +00:00
ba0fd42781
OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=196
Reinhard Max
2021-02-11 09:58:56 +00:00
5925bc96a2
OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=195
Reinhard Max
2021-02-11 09:57:17 +00:00
d751f92442
- bsc#1181788: Make the code for the service name change robust to the simplified systemd-sysv-convert script. - Fix systemd dependencies.
Reinhard Max
2021-02-08 15:35:25 +00:00
63a0740cd5
OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=193
Reinhard Max
2021-02-01 11:16:35 +00:00
44ae99386a
Accepting request 861809 from home:mnhauke
Reinhard Max
2021-02-01 11:13:51 +00:00
823164ad70
Accepting request 844219 from network:time
Dominique Leuenberger
2020-10-30 10:45:54 +00:00
481a225f5c
Accepting request 841479 from home:jengelh:branches:network:time
Martin Pluskal
2020-10-27 07:28:54 +00:00
2c50904bdb
Accepting request 817085 from network:time
Dominique Leuenberger
2020-06-27 21:21:33 +00:00
44a2d3f2b1
OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=190
Reinhard Max
2020-06-25 15:27:12 +00:00
b8824d8ff3
- Silence an OpenSSL version warning (bsc#992038, ntp-openssl-version.patch).
Reinhard Max
2020-06-25 15:20:13 +00:00
d79cafcd8e
- Update to 4.2.8p15 - Fixed security issues: * bsc#1169740, CVE-2020-11868: DoS on client ntpd using server mode packet * bsc#1171355, CVE-2018-8956: remote attackers may prevent a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed mode 3 and mode 5 packets. * bsc#1172651, CVE-2020-13817: vulnerable to off-path attack * bsc#1173334, CVE-2020-15025: Remote DoS when CMAC key is used - Bugfixes in 4.2.8p15 and 4.2.8p14 include: * [Bug 3667] decodenetnum fails with numeric port * [Bug 3666] avoid unlimited receive buffer allocation * [Bug 3660] Manycast orphan mode startup discovery problem. * [Bug 3655] ntpdc memstats hash counts * [Bug 3653] Refclock jitter RMS calculation * [Bug 3646] Avoid sync with unsync orphan * [Bug 3644] Unsynchronized server [...] selected as candidate * [Bug 3636] NMEA: combine time/date from multiple sentences * [Bug 3635] Make leapsecond file hash check optional * [Bug 3628] raw DCF decoding - improve robustness * [Bug 3620] memory leak in ntpq sysinfo * [Bug 3619] Honour drefid setting in cooked mode and sysinfo * [Bug 3617] Add support for ACE III and Copernicus II receivers * [Bug 3615] accelerate refclock startup * [Bug 3613] Propagate noselect to mobilized pool servers * [Bug 3612] Use-of-uninitialized-value in receive function * [Bug 3611] NMEA time interpreted incorrectly * [Bug 3609] Fixing wrong falseticker in case of non-statistic jitter * [Bug 3604] Wrong param byte order passing into record_raw_stats() in ntp_io.c
Reinhard Max
2020-06-25 14:02:05 +00:00
1c048e6122
Accepting request 815962 from home:dimstar:Factory
Martin Pluskal
2020-06-19 18:22:54 +00:00
85fcbbf485
Accepting request 815414 from home:dimstar:Factory
Martin Pluskal
2020-06-19 13:43:01 +00:00
07df6f7877
Accepting request 768084 from network:time
Dominique Leuenberger
2020-01-30 08:38:37 +00:00
87f696822a
Accepting request 768067 from home:kukuk:branches:network:time
Martin Pluskal
2020-01-28 16:14:17 +00:00
5ae4e68ff5
Accepting request 720097 from network:time
Dominique Leuenberger
2019-08-07 11:54:17 +00:00
210b5787c5
Accepting request 718254 from home:mgerstner:branches:network:time
Martin Pluskal
2019-07-31 17:56:34 +00:00
c1ae19043f
Accepting request 715673 from network:time
Dominique Leuenberger
2019-07-29 15:24:29 +00:00
04eac2c545
Accepting request 715455 from home:marxin:branches:openSUSE:Factory:Rings:1-MinimalX
Reinhard Max
2019-07-16 12:08:06 +00:00
d09099be31
Accepting request 709068 from network:time
Dominique Leuenberger
2019-06-24 19:47:42 +00:00
3903d1d6ad
Accepting request 708087 from home:scarabeus_iv:branches:network:time
Martin Pluskal
2019-06-11 07:51:05 +00:00
a7d9813808
Accepting request 700033 from network:time
Dominique Leuenberger
2019-05-03 20:26:48 +00:00
fc26295742
Accepting request 695079 from home:kukuk:branches:network:time
Martin Pluskal
2019-05-02 08:16:41 +00:00
c073ae22a7
Accepting request 684184 from network:time
Dominique Leuenberger
2019-03-13 08:08:37 +00:00
68a3f48f2a
- Update ro 4.2.8p13 * CVE-2019-8936, bsc#1128525: Crafted null dereference attack in authenticated mode 6 packet. * Fix several bugs in the BANCOMM reclock driver. * Fix ntp_loopfilter.c snprintf compilation warnings. * Fix spurious initgroups() error message. * Fix STA_NANO struct timex units. * Fix GPS week rollover in libparse. * Fix incorrect poll interval in packet. * Add a missing check for ENABLE_CMAC.
Reinhard Max
2019-03-11 16:01:00 +00:00
1f0f01859c
Accepting request 678071 from home:fbui:branches:network:time
Reinhard Max
2019-03-05 16:23:21 +00:00
c68d67fc75
Accepting request 657615 from network:time
Dominique Leuenberger
2018-12-26 23:23:16 +00:00
164c692fb3
Accepting request 656782 from home:fbui:branches:network:time
Reinhard Max
2018-12-12 16:20:50 +00:00
9cd60aa87e
Accepting request 640670 from network:time
Dominique Leuenberger
2018-10-22 09:01:34 +00:00
8ead51c56f
* Add further tweaks to improve the fix for CVE-2018-7170, bsc#1083424.
Reinhard Max
2018-10-08 14:22:19 +00:00
39680178a6
- Update to 4.2.8p12 * CVE-2018-12327, bsc#1098531: fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. * Further tweaks to improve the fix for CVE-2018-7170. * ntp-usrgrp-resolver.patch was integrated upstream. - Don't run autoreconf anymore and remove all related hacks and BuildRequires.
Reinhard Max
2018-10-08 14:16:15 +00:00
7cdf668f58
Accepting request 601632 from network:time
Dominique Leuenberger
2018-04-30 20:52:21 +00:00
2b8a9e04ea
OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=175
Reinhard Max
2018-04-26 15:05:01 +00:00
a02eac2054
- Refactor the key handling in %post so that it does not overwrite user settings (bsc#1036505) and is more robust against ignored SIGPIPE (bsc#1090564).
Reinhard Max
2018-04-24 15:43:29 +00:00
19d2c6cd6a
Accepting request 592537 from network:time
Dominique Leuenberger
2018-04-01 15:25:23 +00:00
7712413935
Accepting request 588327 from home:cboltz:branches:network:time
Martin Pluskal
2018-03-30 09:46:13 +00:00
508e35c19c
Accepting request 586702 from network:time
Dominique Leuenberger
2018-03-19 22:31:09 +00:00
2e183e96a3
Fix typo in changes
Reinhard Max
2018-03-14 09:03:19 +00:00
d92efc6e57
- Update to 4.2.8p11 (bsc#1082210):
Reinhard Max
2018-03-06 15:52:20 +00:00
e30cd939cd
- Update to 4.2.8p10 (bsc#1082210): * CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. * CVE-2018-7182, bsc#1083426: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. * CVE-2018-7170, bsc#1083424: Multiple authenticated ephemeral associations. * CVE-2018-7184, bsc#1083422: Interleaved symmetric mode cannot recover from bad state. * CVE-2018-7185, bsc#1083420: Unauthenticated packet can reset authenticated interleaved association. * CVE-2018-7183, 1083417: ntpq:decodearr() can write beyond its buffer limit. * Obsoletes these patches: ntp-sntp-a.patch, ntp-warnings.patch - Remove dead code from conf.start-ntpd (bsc#1082063). - Don't use libevent's cached time stamps in sntp. (bsc#1077445, ntp-sntp-libevent.patch)
Reinhard Max
2018-03-06 13:22:11 +00:00
28fa19fb11
Accepting request 561845 from network:time
Dominique Leuenberger
2018-01-16 08:24:07 +00:00
67c0b150be
- Add ntp-reproducible.patch to make build reproducible (boo#1047218)
Reinhard Max
2017-12-29 10:43:34 +00:00
2d1d14a1c8
- Restart nptd if failed or aborted (FATE#315133). - Do not try to set the HW clock when adding a server at runtime to avoid blocking systemd.
Reinhard Max
2017-12-21 14:11:33 +00:00
3d97b5f0a4
Accepting request 559102 from home:bmwiedemann:branches:network:time
Reinhard Max
2017-12-21 14:08:36 +00:00
7bf2548f47
Accepting request 545184 from network:time
Dominique Leuenberger
2017-11-30 11:41:12 +00:00
76a1c245fc
Accepting request 544753 from home:RBrownSUSE:branches:network:time
Reinhard Max
2017-11-24 12:58:23 +00:00
f34f55aef7
Accepting request 486156 from network:time
Yuchen Lin
2017-04-11 10:40:07 +00:00
f22d02700e
- Enable experimental leap smearing (fate#321003). See /usr/share/doc/packages/ntp/README.leapsmear for details.
Reinhard Max
2017-04-06 13:57:43 +00:00
e6f6080277
Accepting request 486150 from home:aeneas_jaissle:branches:network:time
Reinhard Max
2017-04-06 13:55:07 +00:00
522b006207
OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=163
Reinhard Max
2017-03-24 16:03:10 +00:00
bf90adae4c
- Move ntp-kod to /var/lib/ntp, because /var/db is not a
Reinhard Max
2017-03-24 15:41:36 +00:00
2b44453e1e
- Update to 4.2.8p10 (bsc#1030050): * Sec 3389 / CVE-2017-6464 / VU#325339: NTP-01-016 NTP: Denial of Service via Malformed Config * Sec 3388 / CVE-2017-6462 / VU#325339: NTP-01-014 NTP: Buffer Overflow in DPTS Clock * Sec 3387 / CVE-2017-6463 / VU#325339: NTP-01-012 NTP: Authenticated DoS via Malicious Config Option * Sec 3386: NTP-01-011 NTP: ntpq_stripquotes() returns incorrect Value * Sec 3385: NTP-01-010 NTP: ereallocarray()/eallocarray() underused * Sec 3381: NTP-01-006 NTP: Copious amounts of Unused Code * Sec 3380: NTP-01-005 NTP: Off-by-one in Oncore GPS Receiver * Sec 3379 / CVE-2017-6458 / VU#325339: NTP-01-004 NTP: Potential Overflows in ctl_put() functions * Sec 3378 / CVE-2017-6451 / VU#325339: NTP-01-003 Improper use of snprintf() in mx4200_send() * Sec 3377 / CVE-2017-6460 / VU#325339: NTP-01-002 Buffer Overflow in ntpq when fetching reslist * Sec 3376: NTP-01-001 Makefile does not enforce Security Flags * Sec 3361 / CVE-2016-9042 / VU#325339: 0rigin (zero origin) DoS. * [Bug 3393] clang scan-build findings * [Bug 3363] Support for openssl-1.1.0 without compatibility modes * [Bug 3356] Bugfix 3072 breaks multicastclient * [Bug 3173] forking async worker: interrupted pipe I/O * [Bug 3139] (...) time_pps_create: Exec format error * [Bug 3107] Incorrect Logic for Peer Event Limiting * [Bug 3062] Change the process name of forked DNS worker * [Bug 2923] Trap Configuration Fail * [Bug 2896] Nothing happens if minsane < maxclock < minclock
Reinhard Max
2017-03-23 17:29:11 +00:00
f90b43a5e6
Accepting request 480781 from network:time
Dominique Leuenberger
2017-03-21 21:45:04 +00:00
5a21723a6c
Accepting request 461929 from network:time
Dominique Leuenberger
2017-03-11 14:17:30 +00:00
c313c619d8
- Fix a problem with multicast clients. (bsc#1018940, ntp-unbreak-multicast.patch)
Reinhard Max
2017-03-10 08:43:14 +00:00
49cb8a6dfa
(ntp-move-kod-file.patch)
Reinhard Max
2017-03-02 13:13:53 +00:00
62581c705d
standard directory and causes problems for transactional updates (ntp-pathfind.patch)
Reinhard Max
2017-03-02 13:06:09 +00:00
6906571a54
- Move ntp-kod to /var/lib/ntp/db, because /var/db is not a standard directory and causes problems for transactional updates. ntp-pathfind.patch warnings (bsc#956365, ntp-pathfind.patch).
Reinhard Max
2017-03-02 13:04:54 +00:00
5d0e3b3f14
Accepting request 459516 from home:kukuk:branches:network:time
Reinhard Max
2017-03-02 08:45:16 +00:00
58c0863644
- Remove 50-ntp.list (bsc#1011919). - Use system-wide libevent instead of local copy.
Reinhard Max
2017-02-15 15:52:31 +00:00
b4d8a52d1b
- Simplify ntpd's search for its own executable to prevent AppArmor warnings (bsc#956365).
Reinhard Max
2016-11-28 16:10:06 +00:00
e60bddb259
Accepting request 441452 from network:time
Dominique Leuenberger
2016-11-25 11:02:25 +00:00
7a2805aa9c
- Update to 4.2.8p9: * CVE-2016-9311: Trap crash. * CVE-2016-9310: Mode 6 unauthenticated trap information disclosure and DDoS vector. * CVE-2016-7427: Broadcast Mode Replay Prevention DoS. * CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS. * CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass. * CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal(). * CVE-2016-7429: Interface selection attack. * CVE-2016-7426: Client rate limiting and server responses. * CVE-2016-7433: Reboot sync calculation problem. * Fix a spurious error message (obsoletes ntp-sigchld.patch). * Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog. - Fix a regression in "trap" (bsc#981252, ntp-trap.patch). - Reduce the number of netlink groups to listen on for changes to the local network setup (bsc#992606, ntp-netlink.patch). - Fix segfault in "sntp -a" (bnc#1009434, ntp-sntp-a.patch). - Silence an OpenSSL version warning (bsc#992038, ntp-openssl-version.patch).
Reinhard Max
2016-11-22 16:24:33 +00:00
d8749f1807
Accepting request 434567 from network:time
Dominique Leuenberger
2016-10-14 07:27:45 +00:00
48a4b33878
Accepting request 433443 from home:Guillaume_G:tracker
Reinhard Max
2016-10-05 13:18:57 +00:00
dfbaaccd07
Accepting request 430705 from network:time
Dominique Leuenberger
2016-09-30 13:25:33 +00:00