History log of /freebsd/usr.sbin/ntp/scripts/mkver (Results 1 – 25 of 63)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
# 018a4ab7 27-May-2024 Cy Schubert <cy@FreeBSD.org>

ntp: Update version strings

Reported by: "Herbert J. Skuhra" <herbert@gojira.at>
MFC after: 3 days
Fixes: f5f40dd63bc7


Revision tags: release/13.3.0, release/14.0.0
# d0b2dbfa 16-Aug-2023 Warner Losh <imp@FreeBSD.org>

Remove $FreeBSD$: one-line sh pattern

Remove /^\s*#[#!]?\s*\$FreeBSD\$.*$\n/


# 4d780613 01-Jun-2023 Cy Schubert <cy@FreeBSD.org>

ntp: Update version string

Chase a466cc55373f, updating the version string in the local config.h.

Reported by: Trond Endrestol <Trond.Endrestol@ximalas.info>
Fixes: a466cc55373f
MFC after: immedi

ntp: Update version string

Chase a466cc55373f, updating the version string in the local config.h.

Reported by: Trond Endrestol <Trond.Endrestol@ximalas.info>
Fixes: a466cc55373f
MFC after: immediately

show more ...


Revision tags: release/13.2.0, release/12.4.0, release/13.1.0, release/12.3.0, release/13.0.0, release/12.2.0
# 767173ce 24-Jun-2020 Cy Schubert <cy@FreeBSD.org>

MFV r362565:

Update 4.2.8p14 --> 4.2.8p15

Summary: Systems that use a CMAC algorithm in ntp.keys will not release
a bit of memory on each packet that uses a CMAC keyid, eventually causing
ntpd to r

MFV r362565:

Update 4.2.8p14 --> 4.2.8p15

Summary: Systems that use a CMAC algorithm in ntp.keys will not release
a bit of memory on each packet that uses a CMAC keyid, eventually causing
ntpd to run out of memory and fail. The CMAC cleanup from
https://bugs.ntp.org/3447, part of ntp-4.2.8p11, introduced a bug whereby
the CMAC data structure was no longer completely removed.

MFC after: 3 days
Security: NTP Bug 3661

show more ...


Revision tags: release/11.4.0
# 5bff36fe 12-Dec-2019 Kyle Evans <kevans@FreeBSD.org>

usr.sbin/ntp: don't emit versions w/ make -s

<sys.mk> defines ECHO=echo when not using make -s, and ECHO=true when using
make -s.

export ECHO for ntp products and use it in the mkver script to echo

usr.sbin/ntp: don't emit versions w/ make -s

<sys.mk> defines ECHO=echo when not using make -s, and ECHO=true when using
make -s.

export ECHO for ntp products and use it in the mkver script to echo the
version. This suppresses the output as appropriate. ECHO is given a default
value to make sure things still work as expected for anyone that isn't
redefining ECHO.

Reviewed by: cy
MFC after: 1 week
Differential Revision: https://reviews.freebsd.org/D22101

show more ...


Revision tags: release/12.1.0, release/11.3.0, release/12.0.0
# 7847e041 24-Aug-2018 Dimitry Andric <dim@FreeBSD.org>

Merge ^/head r338026 through r338297, and resolve conflicts.


# 4e1ef62a 21-Aug-2018 Xin LI <delphij@FreeBSD.org>

MFV r338092: ntp 4.2.8p12.

Relnotes: yes


Revision tags: release/11.2.0
# 09100258 28-Feb-2018 Xin LI <delphij@FreeBSD.org>

MFV r330102: ntp 4.2.8p11


Revision tags: release/10.4.0, release/11.1.0
# f0574f5c 23-Mar-2017 Xin LI <delphij@FreeBSD.org>

MFV r315791: ntp 4.2.8p10.


# 0ed76ec8 24-Nov-2016 Dimitry Andric <dim@FreeBSD.org>

Merge ^/head r308870 through r309105.


# f391d6bc 22-Nov-2016 Xin LI <delphij@FreeBSD.org>

MFV r308954:

ntp 4.2.8p9.

Approved by: so


Revision tags: release/11.0.1, release/11.0.0
# e27abb66 03-Jun-2016 Xin LI <delphij@FreeBSD.org>

MFV r301238:

ntp 4.2.8p8.

Security: CVE-2016-4957, CVE-2016-4953, CVE-2016-4954
Security: CVE-2016-4955, CVE-2016-4956
Security: FreeBSD-SA-16:24.ntp
With hat: so


# 4990d495 27-Apr-2016 Xin LI <delphij@FreeBSD.org>

MFV r298691:

ntp 4.2.8p7.

Security: CVE-2016-1547, CVE-2016-1548, CVE-2016-1549, CVE-2016-1550
Security: CVE-2016-1551, CVE-2016-2516, CVE-2016-2517, CVE-2016-2518
Security: CVE-2016-2519
Security:

MFV r298691:

ntp 4.2.8p7.

Security: CVE-2016-1547, CVE-2016-1548, CVE-2016-1549, CVE-2016-1550
Security: CVE-2016-1551, CVE-2016-2516, CVE-2016-2517, CVE-2016-2518
Security: CVE-2016-2519
Security: FreeBSD-SA-16:16.ntp
With hat: so

show more ...


Revision tags: release/10.3.0
# f9421853 25-Jan-2016 Glen Barber <gjb@FreeBSD.org>

MFH

Sponsored by: The FreeBSD Foundation


# d9b9dae1 22-Jan-2016 Dimitry Andric <dim@FreeBSD.org>

Merge ^/head r294169 through r294598.


# 009e81b1 22-Jan-2016 Bjoern A. Zeeb <bz@FreeBSD.org>

MFH @r294567


# 68ba7e87 22-Jan-2016 Xin LI <delphij@FreeBSD.org>

MFV r294491: ntp 4.2.8p6.

Security: CVE-2015-7973, CVE-2015-7974, CVE-2015-7975
Security: CVE-2015-7976, CVE-2015-7977, CVE-2015-7978
Security: CVE-2015-7979, CVE-2015-8138, CVE-2015-8139
Security:

MFV r294491: ntp 4.2.8p6.

Security: CVE-2015-7973, CVE-2015-7974, CVE-2015-7975
Security: CVE-2015-7976, CVE-2015-7977, CVE-2015-7978
Security: CVE-2015-7979, CVE-2015-8138, CVE-2015-8139
Security: CVE-2015-8140, CVE-2015-8158
With hat: so

show more ...


# e6068002 12-Jan-2016 Glen Barber <gjb@FreeBSD.org>

MFH

Sponsored by: The FreeBSD Foundation


# 89d3f0ea 11-Jan-2016 Dimitry Andric <dim@FreeBSD.org>

Merge ^/head r293430 through r293685.


# 1c2b1cec 09-Jan-2016 Xin LI <delphij@FreeBSD.org>

Fix version number.


# b626f5a7 04-Jan-2016 Glen Barber <gjb@FreeBSD.org>

MFH r289384-r293170

Sponsored by: The FreeBSD Foundation


# a5d8944a 19-Nov-2015 Navdeep Parhar <np@FreeBSD.org>

Catch up with head (r291075).


# 3c3feed4 01-Nov-2015 Baptiste Daroussin <bapt@FreeBSD.org>

Merge from head


# 11d38a57 28-Oct-2015 Baptiste Daroussin <bapt@FreeBSD.org>

Merge from head

Sponsored by: Gandi.net


# 9034852c 22-Oct-2015 Gleb Smirnoff <glebius@FreeBSD.org>

MFV ntp-4.2.8p4 (r289715)

Security: VuXML: c4a18a12-77fc-11e5-a687-206a8a720317
Security: CVE-2015-7871
Security: CVE-2015-7855
Security: CVE-2015-7854
Security: CVE-2015-7853
Security: CVE-20

MFV ntp-4.2.8p4 (r289715)

Security: VuXML: c4a18a12-77fc-11e5-a687-206a8a720317
Security: CVE-2015-7871
Security: CVE-2015-7855
Security: CVE-2015-7854
Security: CVE-2015-7853
Security: CVE-2015-7852
Security: CVE-2015-7851
Security: CVE-2015-7850
Security: CVE-2015-7849
Security: CVE-2015-7848
Security: CVE-2015-7701
Security: CVE-2015-7703
Security: CVE-2015-7704, CVE-2015-7705
Security: CVE-2015-7691, CVE-2015-7692, CVE-2015-7702
Security: http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_Security_Vulner
Sponsored by: Nginx, Inc.

show more ...


123