d93a17fdd8
NTP 4.2.8p13 2019-03-07 This release fixes a bug that allows an attacker with access to an explicitly trusted source to send a crafted malicious mode 6 (ntpq) packet that can trigger a NULL pointer dereference, crashing ntpd. It also provides 17 other bugfixes and 1 other improvement. NTP 4.2.8p12 2018-04-09 This release fixes a "hole" in the noepeer capability introduced to ntpd in ntp-4.2.8p11, and a buffer overflow in the openhost() function used by ntpq and ntpdc. It also provides 26 other bugfixes, and 4 other improvements. NTP 4.2.8p11 2018-02-27 This release fixes 2 low-/medium-, 1 informational/medum-, and 2 low-severity vulnerabilities in ntpd, one medium-severity vulernability in ntpq, and provides 65 other non-security fixes and improvements.
8 lines
552 B
Text
8 lines
552 B
Text
$NetBSD: distinfo,v 1.30 2019/03/25 17:19:59 tnn Exp $
|
|
|
|
SHA1 (ntp-4.2.8p13.tar.gz) = cff200a987d64e891fb349a22313ecb0feaea090
|
|
RMD160 (ntp-4.2.8p13.tar.gz) = 5d85e2a01bafa0bb755ab49e462f6dd7f96ce3d0
|
|
SHA512 (ntp-4.2.8p13.tar.gz) = afbdbb8a37b8f4040a8a6939a3a85ad0350d359c153c297b32b8a013c7b7061fd925fa3e6e103671c5901e169156e22497813c654195ba50f890a7170b2f2075
|
|
Size (ntp-4.2.8p13.tar.gz) = 6949363 bytes
|
|
SHA1 (patch-include-ntp__syscall.h) = b247569339d09a88f2e143e355033ce7635ffe92
|
|
SHA1 (patch-sntp_loc_pkgsrc) = 6e46ffc0cc2afcfdc1d01297cbe04cb80d103575
|