#
018a4ab7 |
| 27-May-2024 |
Cy Schubert <cy@FreeBSD.org> |
ntp: Update version strings
Reported by: "Herbert J. Skuhra" <herbert@gojira.at> MFC after: 3 days Fixes: f5f40dd63bc7
|
Revision tags: release/13.3.0, release/14.0.0 |
|
#
d0b2dbfa |
| 16-Aug-2023 |
Warner Losh <imp@FreeBSD.org> |
Remove $FreeBSD$: one-line sh pattern
Remove /^\s*#[#!]?\s*\$FreeBSD\$.*$\n/
|
#
4d780613 |
| 01-Jun-2023 |
Cy Schubert <cy@FreeBSD.org> |
ntp: Update version string
Chase a466cc55373f, updating the version string in the local config.h.
Reported by: Trond Endrestol <Trond.Endrestol@ximalas.info> Fixes: a466cc55373f MFC after: immedi
ntp: Update version string
Chase a466cc55373f, updating the version string in the local config.h.
Reported by: Trond Endrestol <Trond.Endrestol@ximalas.info> Fixes: a466cc55373f MFC after: immediately
show more ...
|
Revision tags: release/13.2.0, release/12.4.0, release/13.1.0, release/12.3.0, release/13.0.0, release/12.2.0 |
|
#
767173ce |
| 24-Jun-2020 |
Cy Schubert <cy@FreeBSD.org> |
MFV r362565:
Update 4.2.8p14 --> 4.2.8p15
Summary: Systems that use a CMAC algorithm in ntp.keys will not release a bit of memory on each packet that uses a CMAC keyid, eventually causing ntpd to r
MFV r362565:
Update 4.2.8p14 --> 4.2.8p15
Summary: Systems that use a CMAC algorithm in ntp.keys will not release a bit of memory on each packet that uses a CMAC keyid, eventually causing ntpd to run out of memory and fail. The CMAC cleanup from https://bugs.ntp.org/3447, part of ntp-4.2.8p11, introduced a bug whereby the CMAC data structure was no longer completely removed.
MFC after: 3 days Security: NTP Bug 3661
show more ...
|
Revision tags: release/11.4.0 |
|
#
5bff36fe |
| 12-Dec-2019 |
Kyle Evans <kevans@FreeBSD.org> |
usr.sbin/ntp: don't emit versions w/ make -s
<sys.mk> defines ECHO=echo when not using make -s, and ECHO=true when using make -s.
export ECHO for ntp products and use it in the mkver script to echo
usr.sbin/ntp: don't emit versions w/ make -s
<sys.mk> defines ECHO=echo when not using make -s, and ECHO=true when using make -s.
export ECHO for ntp products and use it in the mkver script to echo the version. This suppresses the output as appropriate. ECHO is given a default value to make sure things still work as expected for anyone that isn't redefining ECHO.
Reviewed by: cy MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D22101
show more ...
|
Revision tags: release/12.1.0, release/11.3.0, release/12.0.0 |
|
#
7847e041 |
| 24-Aug-2018 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r338026 through r338297, and resolve conflicts.
|
#
4e1ef62a |
| 21-Aug-2018 |
Xin LI <delphij@FreeBSD.org> |
MFV r338092: ntp 4.2.8p12.
Relnotes: yes
|
Revision tags: release/11.2.0 |
|
#
09100258 |
| 28-Feb-2018 |
Xin LI <delphij@FreeBSD.org> |
MFV r330102: ntp 4.2.8p11
|
Revision tags: release/10.4.0, release/11.1.0 |
|
#
f0574f5c |
| 23-Mar-2017 |
Xin LI <delphij@FreeBSD.org> |
MFV r315791: ntp 4.2.8p10.
|
#
0ed76ec8 |
| 24-Nov-2016 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r308870 through r309105.
|
#
f391d6bc |
| 22-Nov-2016 |
Xin LI <delphij@FreeBSD.org> |
MFV r308954:
ntp 4.2.8p9.
Approved by: so
|
Revision tags: release/11.0.1, release/11.0.0 |
|
#
e27abb66 |
| 03-Jun-2016 |
Xin LI <delphij@FreeBSD.org> |
MFV r301238:
ntp 4.2.8p8.
Security: CVE-2016-4957, CVE-2016-4953, CVE-2016-4954 Security: CVE-2016-4955, CVE-2016-4956 Security: FreeBSD-SA-16:24.ntp With hat: so
|
#
4990d495 |
| 27-Apr-2016 |
Xin LI <delphij@FreeBSD.org> |
MFV r298691:
ntp 4.2.8p7.
Security: CVE-2016-1547, CVE-2016-1548, CVE-2016-1549, CVE-2016-1550 Security: CVE-2016-1551, CVE-2016-2516, CVE-2016-2517, CVE-2016-2518 Security: CVE-2016-2519 Security:
MFV r298691:
ntp 4.2.8p7.
Security: CVE-2016-1547, CVE-2016-1548, CVE-2016-1549, CVE-2016-1550 Security: CVE-2016-1551, CVE-2016-2516, CVE-2016-2517, CVE-2016-2518 Security: CVE-2016-2519 Security: FreeBSD-SA-16:16.ntp With hat: so
show more ...
|
Revision tags: release/10.3.0 |
|
#
f9421853 |
| 25-Jan-2016 |
Glen Barber <gjb@FreeBSD.org> |
MFH
Sponsored by: The FreeBSD Foundation
|
#
d9b9dae1 |
| 22-Jan-2016 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r294169 through r294598.
|
#
009e81b1 |
| 22-Jan-2016 |
Bjoern A. Zeeb <bz@FreeBSD.org> |
MFH @r294567
|
#
68ba7e87 |
| 22-Jan-2016 |
Xin LI <delphij@FreeBSD.org> |
MFV r294491: ntp 4.2.8p6.
Security: CVE-2015-7973, CVE-2015-7974, CVE-2015-7975 Security: CVE-2015-7976, CVE-2015-7977, CVE-2015-7978 Security: CVE-2015-7979, CVE-2015-8138, CVE-2015-8139 Security:
MFV r294491: ntp 4.2.8p6.
Security: CVE-2015-7973, CVE-2015-7974, CVE-2015-7975 Security: CVE-2015-7976, CVE-2015-7977, CVE-2015-7978 Security: CVE-2015-7979, CVE-2015-8138, CVE-2015-8139 Security: CVE-2015-8140, CVE-2015-8158 With hat: so
show more ...
|
#
e6068002 |
| 12-Jan-2016 |
Glen Barber <gjb@FreeBSD.org> |
MFH
Sponsored by: The FreeBSD Foundation
|
#
89d3f0ea |
| 11-Jan-2016 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r293430 through r293685.
|
#
1c2b1cec |
| 09-Jan-2016 |
Xin LI <delphij@FreeBSD.org> |
Fix version number.
|
#
b626f5a7 |
| 04-Jan-2016 |
Glen Barber <gjb@FreeBSD.org> |
MFH r289384-r293170
Sponsored by: The FreeBSD Foundation
|
#
a5d8944a |
| 19-Nov-2015 |
Navdeep Parhar <np@FreeBSD.org> |
Catch up with head (r291075).
|
#
3c3feed4 |
| 01-Nov-2015 |
Baptiste Daroussin <bapt@FreeBSD.org> |
Merge from head
|
#
11d38a57 |
| 28-Oct-2015 |
Baptiste Daroussin <bapt@FreeBSD.org> |
Merge from head
Sponsored by: Gandi.net
|
#
9034852c |
| 22-Oct-2015 |
Gleb Smirnoff <glebius@FreeBSD.org> |
MFV ntp-4.2.8p4 (r289715)
Security: VuXML: c4a18a12-77fc-11e5-a687-206a8a720317 Security: CVE-2015-7871 Security: CVE-2015-7855 Security: CVE-2015-7854 Security: CVE-2015-7853 Security: CVE-20
MFV ntp-4.2.8p4 (r289715)
Security: VuXML: c4a18a12-77fc-11e5-a687-206a8a720317 Security: CVE-2015-7871 Security: CVE-2015-7855 Security: CVE-2015-7854 Security: CVE-2015-7853 Security: CVE-2015-7852 Security: CVE-2015-7851 Security: CVE-2015-7850 Security: CVE-2015-7849 Security: CVE-2015-7848 Security: CVE-2015-7701 Security: CVE-2015-7703 Security: CVE-2015-7704, CVE-2015-7705 Security: CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Security: http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_Security_Vulner Sponsored by: Nginx, Inc.
show more ...
|