| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Restore ntp to prior to the ASLR mitigations applied.
When ASLR and subsequently PIE were committed to the FreeBSD kernel, ntpd
would segfault due to insufficient stack. This was because stack gap was
not taken into account by applications requesting stack and/or memory
limits. (BTW, this problem also affected firefox and thunderbird.)
This subsequently caused disabling of rlimit memlock, which could not be
avoided under the previous implementation of ASLR:
Cannot set RLIMIT_MEMLOCK: Operation not permitted
Since then a number of improvments to ASLR stack gap implementation have
rendered the mitigations unnecessary. The mitigations initially developed
here at FreeBSD were subsequently upstreamed (noticed by the folks at
nwtime.org and automatically upstreamed). The mitigations have been
reversed in the base system. This patch reverses the ASLR mitigations in
the port as well.
PR: 262031
Reported by: p5B2E9A8F@t-online.de
|
|
|
|
|
|
|
|
| |
Fix stackgap build on older FreeBSD.
PR: 261491
Reported by: tomasz.sowinski@nucleus.malbork.pl
MFH: 2022Q1
|
|
|
|
|
|
|
|
| |
There should be no minimum to 1300524.
Reported by: Scott Allendorf <scott-allendorf@uiowa.edu>
Fixes: a6e356e8f50f92acbdec6156c068e768d1835591
MFH: 2022Q1
|
|
|
|
|
|
|
| |
As stack gap mitigations have been MFCed to stable/13, reverse
"Disable ntpd stack gap" for __FreeBSD_version < 1300524 too.
MFH: 2022Q1
|
|
|
|
|
|
|
| |
__FreeBSD_version < 1400038 is more appropriate as it follows the
commit to resolve setrlimit(2) segfaults.
MFH: 2021Q4
|
|
|
|
|
|
|
|
| |
Only Reverse "Disable ntpd stack gap" for __FreeBSD_version < 1400037
for now until the next __FreeBSD_version bump.
Reported by: kevans
MFH: 2021Q4
|
|
|
|
|
|
|
|
|
|
|
|
| |
120137c822c9697c19cf94461f436f8ccc372d24 (svn r517694) disabled ntpd
ASLR stack gap, which caused ntpd to segfault. (The patch in
120137c822c9697c19cf94461f436f8ccc372d24 was subsequently submitted
to nwtime.org for inclusion into upstream ntp.) src commit
889b56c8cd84c9a9f2d9e3b019c154d6f14d9021 addressed the underlying cause
for the setrlimit segfault negating the need for this workaround. This
commit removes the workaround.
MFH: 2021Q4 (after a month)
|
|
|
|
|
|
|
|
|
|
|
|
| |
NTP is developed using the bitkeeper VCS. checkHtmlFileDates, uses
bitkeeper metadata to alter dates in html files. This results in
a bunch of *.old files installed in ${STAGEDIR}. As the distribution
tarball contains no bitkeeper metadata, no dates are updated at the
cost of failed build. This patch teaches scripts/build/checkHtmlFileDates
to act as if bitkeeper is not installed regardless of bitkeeper's
installatikon status.
MFH: 2021Q4
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
Summary: Systems that use a CMAC algorithm in ntp.keys will not release
a bit of memory on each packet that uses a CMAC keyid, eventually causing
ntpd to run out of memory and fail. The CMAC cleanup from
https://bugs.ntp.org/3447, part of ntp-4.2.8p11, introduced a bug whereby
the CMAC data structure was no longer completely removed.
MFH: 2020Q3
Security: NTP Bug 3661
|
|
|
|
|
|
|
|
|
|
| |
because they all install sbin/ntpd
Also remove -* for versions because this isn't needed.
PR: 246553
Reported by: naddy
Approved by: portmgr (port compliance, infrastructure)
|
|
|
|
|
|
|
|
|
|
| |
Only a small nit here: psl should be declared extern and defined exactly
once.
-fno-common will become the default in GCC10/LLVM11.
Obtained from: src r359676 (kevans)
MFH: 2020Q2
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The advisory can be found at:
http://support.ntp.org/bin/view/Main/SecurityNotice#\
March_2020_ntp_4_2_8p14_NTP_Rele
No CVEs have been documented yet.
MFH: 2020Q2
Security: http://support.ntp.org/bin/view/Main/NtpBug3610
http://support.ntp.org/bin/view/Main/NtpBug3596
http://support.ntp.org/bin/view/Main/NtpBug3592
|
|
|
|
| |
is disabled by default.
|
|
|
|
|
|
|
|
|
| |
PR: 241421, 241960
Reported by: Vladimir Zakharov <zakharov.vv@gmail.com>,
dewayne@heuristicsystems.com.au
Reviewed by: kib, imp (previous version), ian (suggestion)
MFH: 2019Q4
Differential Revision: https://reviews.freebsd.org/D22358
|
|
|
|
| |
ntpd/ntpd.c.
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Follow up on ports r511987 (base r352304) which disabled default
mlockall() at startup. Unfortunately though the original tarball
supports this in ./configure (for Linux), to fully support disabling
of mlockall() by default requires a little extra help otherwise the
following is logged in syslog:
Cannot set RLIMIT_MEMLOCK: Operation not permitted
|
|
|
|
|
|
|
| |
Reduce calls to close(2) at startup through the use of closefrom(2).
Submitted by: pawel.biernacki@gmail.com (based on)
Obtained from: base r352518
|
|
|
|
|
|
|
|
|
|
| |
wish to restore historic BSD behaviour can add the following to ntp.conf:
rlimit memlock 32
Discussed on: freebsd-current@ between Sept 6-9, 2019
Mentioned in Differential Revision:
https://reviews.freebsd.org/D21581
|
| |
|
|
|
|
| |
(and missed 3 missed files from previous categories.)
|
|
|
|
|
|
|
|
|
|
| |
Changes: https://github.com/libevent/libevent/releases/tag/release-2.1.11-stable
ABI: https://abi-laboratory.pro/tracker/timeline/libevent/
PR: 239599
Reported by: GitHub (watch releases)
Approved by: zeising (maintainer)
MFH: 2019Q3 (maybe security, partially restores 2.1.8 ABI)
Differential Revision: https://reviews.freebsd.org/D21133
|
| |
|
|
|
|
|
| |
Submitted by: garga@
MFH: 2018Q4
|
|
|
|
|
|
|
|
|
|
| |
sysrc.
mat@ suggested this however as I'm not enamoured with sysrc, it has
been added as annother approach to add/edit rc.conf variables.
Reported by: mat@
MFH: 2018Q3
|
|
|
|
|
| |
Reported by: Herbert J. Skuhra <herbert@gojira.at>
MFH: 2018Q3
|
|
|
|
|
|
|
| |
instead of base ntp.
Reported by: adamw
MFH: 2018Q3
|
|
|
|
| |
MFH: 2018Q3
|
|
|
|
|
|
|
|
|
|
|
|
| |
These changes add support for running ntpd as non-root, and improve support
for the --jaildir (chroot) option when running on freebsd. These correspond
to the changes made in the base system with r336525.
The new patches in this change are exactly what was submitted upstream in
https://bugs.ntp.org/show_bug.cgi?id=3509
Approved by: cy@
Differential Revision: https://reviews.freebsd.org/D16396
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This a security release for libwww to take into account security advisories
CVE-2016-9063 and CVE-2017-9233.
In order to take into account current and future expat security advisories,
the expat source code was removed from the libwww tree. The makefiles were
modified so that libwww dynamically links against the system's expat library.
Patches removed were incorporated upstream.
Bump PORTREVISION of dependent ports due shlib change.
Changes: https://raw.githubusercontent.com/w3c/libwww/5.4.2/ChangeLog
MFH: 2018Q3
Security: e375ff3f-7fec-11e8-8088-28d244aee256
|
|
|
|
| |
MFH: 2018Q1
|
|
|
|
| |
PR: 223819
|
|
|
|
| |
Reported by: rodrigo
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
default. (New patch from ian@.)
While here ian@ and I discussed the www/libwww libmd5 dependency. It
turns out that if the sntp configure script finds libmd5, it uses it.
This is now an option to include the dependency.
While working on the libmd5 dependency it was discovered that the
sntp build requires SSL only if it finds libmd5. This is now an
IMPLIES.
Thanks to ian@ for the additional patch and for discovering the
libmd5 check, pointing me in the right direction to solve the without
SSL breakage.
PR: 218078
Submitted by: ian@ (default driver options)
Discussed with: ian@ (libmd5 dependency)
|
|
|
|
| |
longer needs it.
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The current use of CONFIGURE_ON to handle refclock options allows
adding a refclock that is off by default, but doesn't allow a user
to eliminate refclocks that ntpd includes by default.
Using CONFIGURE_ENABLE instead of CONFIGURE_ON will add the proper
--disable-REFCLOCKNAME to the args when the user disables default-on
options.
PR: 218078
Submitted by: ian@
|
| |
|
|
|
|
| |
--enable-debug. This enables -d and -D options within ntpd.
|
|
|
|
|
| |
of this port when ssl is not specified but corrects the incorrect
specification regerdless.
|
|
|
|
| |
a file documented in volume 5.
|
|
|
|
| |
resulting in a build failure.
|
| |
|
|
|
|
|
| |
PR: 216777
Approved by: mm (maintainer)
|
|
|
|
|
|
|
|
|
|
|
| |
- DEFAULT_VERSIONS += ssl=openssl-devel is now supported
- devel/py-event and devel/p5-Event-Lib are marked BROKEN
Changes: https://github.com/libevent/libevent/raw/release-2.1.8-stable/whatsnew-2.1.txt
Changes: https://github.com/libevent/libevent/raw/release-2.1.8-stable/ChangeLog
PR: 216527
Exp-run by: antoine
Approved by: mm (maintainer)
|
|
|
|
| |
Sponsored by: Absolight
|
|
|
|
|
| |
PR: 215323
Submitted by: naddy
|
|
|
|
|
|
| |
symbol conflicts.
PR: 215093
|
|
|
|
| |
As suggested by koobs, describe error in BROKEN=.
|
| |
|