MFH: r540010

Update 4.2.8p14 --> 4.2.8p15

Summary: Systems that use a CMAC algorithm in ntp.keys will not release
a bit of memory on each packet that uses a CMAC keyid, eventually causing
ntpd to run out of memory and fail. The CMAC cleanup from
https://bugs.ntp.org/3447, part of ntp-4.2.8p11, introduced a bug whereby
the CMAC data structure was no longer completely removed.

Security:	NTP Bug 3661
Approved by:	portmgr (joneum)
This commit is contained in:
Cy Schubert 2020-06-24 14:23:18 +00:00
parent 119d50b142
commit 350658cbbd
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/branches/2020Q2/; revision=540065
2 changed files with 4 additions and 4 deletions

View File

@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= ntp
PORTVERSION= 4.2.8p14
PORTVERSION= 4.2.8p15
CATEGORIES= net
MASTER_SITES= http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2/ \
http://archive.ntp.org/ntp4/ntp-4.2/ \

View File

@ -1,3 +1,3 @@
TIMESTAMP = 1583329796
SHA256 (ntp-4.2.8p14.tar.gz) = 1960e4f081f6aafd108d721bc3ab15f9e8dfd08dc08339aa95bca9d2545e4eb7
SIZE (ntp-4.2.8p14.tar.gz) = 7007263
TIMESTAMP = 1592955783
SHA256 (ntp-4.2.8p15.tar.gz) = f65840deab68614d5d7ceb2d0bb9304ff70dcdedd09abb79754a87536b849c19
SIZE (ntp-4.2.8p15.tar.gz) = 7015970