Revisions of ntp
Ana Guerrero (anag+factory)
accepted
request 1183214
from
Factory Maintainer (factory-maintainer)
(revision 140)
Automatic submission by obs-autosubmit
Dominique Leuenberger (dimstar_suse)
accepted
request 1092906
from
Reinhard Max (rmax)
(revision 137)
- Update to 4.2.8p17: * Fix some regressions of 4.2.8p16 - Update to 4.2.8p16: * [Sec 3808] Assertion failure in ntpq on malformed RT-11 date * [Sec 3807], bsc#1210390, CVE-2023-26555: praecis_parse() in the Palisade refclock driver has a hypothetical input buffer overflow. * [Sec 3767] An OOB KoD RATE value triggers an assertion when debug is enabled. * Obsoletes: ntp-CVE-2023-26551.patch, ntp-sntp-dst.patch, ntp-ENOBUFS.patch * Multiple bug fixes and improvements. For details, see: /usr/share/doc/packages/ntp/ChangeLog http://www.ntp.org/support/securitynotice/4_2_8-series-changelog/ - Follow upstream's suggestion to build with debugging disabled: https://www.ntp.org/support/securitynotice/ntpbug3767/
Dominique Leuenberger (dimstar_suse)
accepted
request 1085150
from
Reinhard Max (rmax)
(revision 136)
- bsc#1210386: out-of-bounds writes in mstolfp() * CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554 * Add ntp-CVE-2023-26551.patch
Dominique Leuenberger (dimstar_suse)
accepted
request 1064283
from
Reinhard Max (rmax)
(revision 135)
- bsc#1208004: Make %post script SELinux aware
Dominique Leuenberger (dimstar_suse)
accepted
request 1062463
from
Reinhard Max (rmax)
(revision 134)
Dominique Leuenberger (dimstar_suse)
accepted
request 1061308
from
Reinhard Max (rmax)
(revision 133)
- boo#1207577: set /var/lib/ntp/var/run/ntp to 775
Dominique Leuenberger (dimstar_suse)
accepted
request 957220
from
Reinhard Max (rmax)
(revision 132)
- Modified ntp.NetworkManager: Update ntp servers on dhcp4-change and dhcp6-change, instead of up condition. This is because ntp options are available during dhcp renewed or rebound, and not available when the interface has been activated (bsc#1171547). (forwarded request 957171 from JonathanKang)
Dominique Leuenberger (dimstar_suse)
accepted
request 924903
from
Reinhard Max (rmax)
(revision 131)
Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort (forwarded request 924895 from jsegitz)
Dominique Leuenberger (dimstar_suse)
accepted
request 900200
from
Reinhard Max (rmax)
(revision 130)
- bsc#1186431: Fix a typo in %post .
Dominique Leuenberger (dimstar_suse)
accepted
request 894615
from
Reinhard Max (rmax)
(revision 129)
- jsc#SLE-15482, ntp-clarify-interface.patch: Adjust the documentation to clarify that "interface ignore all" does not cover the wildcard and localhost addresses.
Richard Brown (RBrownSUSE)
accepted
request 876223
from
Reinhard Max (rmax)
(revision 127)
- Disown /var/lib/ntp, it is now part of the sysuser-ntp package.
Dominique Leuenberger (dimstar_suse)
accepted
request 871212
from
Reinhard Max (rmax)
(revision 126)
- bsc#1181788: Make the code for the service name change robust to the simplified systemd-sysv-convert script. - Fix systemd dependencies. - Package statsdir /var/log/ntpstats/ - Let system-user-ntp handle the user/group generation - Introduce subpackage dcf77-tools * testdcf, a simple DCF77 raw impulse test program * dcfd, a simple DCF77 raw impulse receiver - Add patch testdcf-gude.diff * Improves testdcf's compatibility with GUDE DCF77 receivers - Silence an OpenSSL version warning (bsc#992038,bsc#1125401 - removal of ntp.firewall, since SuSEfirewall2 has been replaced by - Drop the omc config ntp.xml fate#301838: - Update to 4.2.8p12 (bsc#1111853):
Dominique Leuenberger (dimstar_suse)
accepted
request 844219
from
Martin Pluskal (pluskalm)
(revision 125)
Dominique Leuenberger (dimstar_suse)
accepted
request 817085
from
Reinhard Max (rmax)
(revision 124)
- Update to 4.2.8p15 - Fixed security issues: * bsc#1169740, CVE-2020-11868: DoS on client ntpd using server mode packet * bsc#1171355, CVE-2018-8956: remote attackers may prevent a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed mode 3 and mode 5 packets. * bsc#1172651, CVE-2020-13817: vulnerable to off-path attack * bsc#1173334, CVE-2020-15025: Remote DoS when CMAC key is used - Bugfixes in 4.2.8p15 and 4.2.8p14 include: * [Bug 3667] decodenetnum fails with numeric port * [Bug 3666] avoid unlimited receive buffer allocation * [Bug 3660] Manycast orphan mode startup discovery problem. * [Bug 3655] ntpdc memstats hash counts * [Bug 3653] Refclock jitter RMS calculation * [Bug 3646] Avoid sync with unsync orphan * [Bug 3644] Unsynchronized server [...] selected as candidate * [Bug 3636] NMEA: combine time/date from multiple sentences * [Bug 3635] Make leapsecond file hash check optional * [Bug 3628] raw DCF decoding - improve robustness * [Bug 3620] memory leak in ntpq sysinfo * [Bug 3619] Honour drefid setting in cooked mode and sysinfo * [Bug 3617] Add support for ACE III and Copernicus II receivers * [Bug 3615] accelerate refclock startup * [Bug 3613] Propagate noselect to mobilized pool servers * [Bug 3612] Use-of-uninitialized-value in receive function * [Bug 3611] NMEA time interpreted incorrectly * [Bug 3609] Fixing wrong falseticker in case of non-statistic jitter * [Bug 3604] Wrong param byte order passing into record_raw_stats() in ntp_io.c
Dominique Leuenberger (dimstar_suse)
accepted
request 768084
from
Martin Pluskal (pluskalm)
(revision 123)
Dominique Leuenberger (dimstar_suse)
accepted
request 720097
from
Martin Pluskal (pluskalm)
(revision 122)
Dominique Leuenberger (dimstar_suse)
accepted
request 715673
from
Reinhard Max (rmax)
(revision 121)
Displaying revisions 1 - 20 of 140