24 Commits

Author SHA1 Message Date
bluhm
f36e4f7d4d Update ntp to 4.2.8p10.
CVE-2016-9042, CVE-2017-6451, CVE-2017-6452, CVE-2017-6455,
CVE-2017-6458, CVE-2017-6459, CVE-2017-6460, CVE-2017-6462,
CVE-2017-6463, CVE-2017-6464
Adapt OpenSSL #ifdef for LibreSSL.
Fix regression tests, prevent them from crashing.
OK deraadt@
2017-03-27 11:33:40 +00:00
naddy
441624ce8b Security update to 4.2.8p9:
CVE-2016-9311: Trap crash
CVE-2016-9310: Mode 6 unauthenticated trap information disclosure and DDoS vector
CVE-2016-7427: Broadcast Mode Replay Prevention DoS
CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS
CVE-2016-9312: Windows: ntpd DoS by oversized UDP packet
CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass
CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal()
CVE-2016-7429: Interface selection attack
CVE-2016-7426: Client rate limiting and server responses
CVE-2016-7433: Reboot sync calculation problem
2016-12-14 20:05:37 +00:00
naddy
d349951b8c Update to 4.2.8p8 for the latest round of security fixes:
http://support.ntp.org/bin/view/Main/SecurityNotice#June_2016_ntp_4_2_8p8_NTP_Securi
2016-06-18 20:19:11 +00:00
naddy
5cb1920e9a Update to 4.2.8p7 for the latest round of security fixes:
http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
2016-04-27 09:16:55 +00:00
naddy
02b7008896 Security update to 4.2.8p6. This addresses numerous security issues. 2016-02-04 19:55:13 +00:00
jca
6c5ee4742c SECURITY update to ntp-4.2.8p4
Per upstream, only low and medium-severity vulns:
http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_Security_Vulner

Diff from Daniel Jakots
2015-11-10 18:33:02 +00:00
sthen
7be59d8512 update to ntp-4.2.8p3, various fixes including a remote crash in some
(uncommon) conditions; if:

- remote configuration of ntpd is enabled (it's disabled by default),
- and an attacker knows the remote configuration password,
- and has access to a computer that is allowed to send remote configuration
requests to ntpd,

the attacker can send a carefully-crafted packet to ntpd that will cause ntpd
to crash.
2015-07-01 10:35:29 +00:00
sthen
d237b6cb3b security update to ntp-4.2.8p2
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities

CVE-2015-1798 "When ntpd is configured to use a symmetric key to authenticate a
remote NTP server/peer, it checks if the NTP message authentication code (MAC)
in received packets is valid, but not if there actually is any MAC included."

CVE-2015-1799 "An attacker knowing that NTP hosts A and B are peering with each
other (symmetric association) can send a packet to host A with source address
of B which will set the NTP state variables on A to the values sent by the
attacker. Host A will then send on its next poll to B a packet with originate
timestamp that doesn't match the transmit timestamp of B and the packet will be
dropped. If the attacker does this periodically for both hosts, they won't be
able to synchronize to each other."
2015-04-08 14:12:44 +00:00
jca
dcbb7fb25c Update to ntp-4.2.8, fixes for several CVEs.
- Weak default key in config_auth() - CVE-2014-9293
- non-cryptographic random number generator with weak seed used by
  ntp-keygen to generate symmetric keys - CVE-2014-9294
- Buffer overflow in crypto_recv() - CVE-2014-9295
- Buffer overflow in ctl_putdata() - CVE-2014-9295
- Buffer overflow in configure() - CVE-2014-9295
- receive(): missing return on error - CVE-2014-9296

ok naddy@
2014-12-24 13:10:20 +00:00
sthen
8178f9fa56 Update ports/net/ntp to 4.2.7p418. This is ntp.org's ntp daemon, *not*
the base system's openntpd.

Update removes a reflected unauthenticated DoS attack vector that has
been hit a lot in the wild recently, see http://www.openntpproject.org/
UDP traffic amplification 19x.

This is a devel version from upstream, they have decided not to fix it in
the stable branch. Users running older versions should add "disable monitor"
to their config and restart, then verify that "monlist" in ntpdc does not
return a list.

ok aja@, missing build dep spotted by naddy
2014-02-09 21:36:46 +00:00
sthen
27f03b1c52 bump REVISION for any ports using route messages. regen some distinfos and
remove unnecessary USE_GROFFs while there.
2013-10-31 21:12:12 +00:00
gonzalo
4cf7f8dabb Update for ntp:
* I remove the patch patch-ntpd_ntp_intres_c because is applied upstream.
* We doesn't need USE_GROFF here.

OK naddy@, aja@
2012-04-10 15:06:29 +00:00
naddy
1f6f6d3a51 update to 4.2.6p2, which incorporates most of our patches 2010-07-10 19:48:32 +00:00
naddy
87b33f29ca update to 4.2.6p1 and remove a lot of cruft 2010-07-03 02:49:43 +00:00
naddy
18b76430e6 SECURITY update to 4.2.4p7:
Fix remote exploit if autokey is enabled (CVE-2009-1252).
2009-05-23 16:32:29 +00:00
naddy
51543f59bd Update to 4.2.4p6.
Kill the multi-packaging.  xntpd is useless without documentation and
if you want a simple NTP server on a tiny machine, use OpenNTPD.
2009-01-27 10:21:38 +00:00
naddy
f954712cb7 update to 4.2.4p5; based on a submission by Wim Lewis <wiml@hhhh.org> 2009-01-26 23:26:02 +00:00
espie
9eafbbfb35 base64 checksums. 2007-04-05 16:19:55 +00:00
danh
047cf81c04 update to the latest stable tarball, ntp-stable-4.2.0a-20050303 2005-03-08 04:16:42 +00:00
naddy
fedfc3867f SIZE 2005-01-05 17:14:37 +00:00
danh
3ef8ad64f5 resolve conflicts from last import 2004-06-05 04:54:53 +00:00
danh
930cb22e5b resolve conflict from last import and remove files that are no longer
needed.
2003-02-23 21:32:41 +00:00
danh
7a84297a59 update to ntp 4.1.72
- no longer need patches for RAND_file_name; it was fixed in -current
2001-12-20 21:07:21 +00:00
danh
ff3fdbc687 * bump patch level of ntp package
* check return of RAND_file_name better; allows ntp-genkeys to continue
  if a seed file is not found.
* regen configure patch
* quote package comments
* files/md5 -> distinfo
2001-12-20 06:14:15 +00:00