From: Harlan Stenn Date: Fri, 22 May 2020 06:45:03 +0000 (+0000) Subject: Merge psp-deb1.ntp.org:/net/nfs1/nfs/home/stenn/ntp-stable-p15 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=660f9d46ba85381808a5edd4c0b00ba2f6129932;p=thirdparty%2Fntp.git Merge psp-deb1.ntp.org:/net/nfs1/nfs/home/stenn/ntp-stable-p15 into psp-deb1.ntp.org:/net/nfs1/nfs/home/stenn/ntp-stable-p15-sec bk: 5ec774eflEtwGGSBTkeOxbIRaFN17w --- 660f9d46ba85381808a5edd4c0b00ba2f6129932 diff --cc ChangeLog index 6c3bbfd42,5cd773531..f50667bd2 --- a/ChangeLog +++ b/ChangeLog @@@ -1,7 -1,8 +1,9 @@@ --- (4.2.8p15) 2020/04/xx Released by Harlan Stenn +* [Sec 3661] memory leak with AES128CMAC keys + * [Bug 3667] decodenetnum fails with numeric port + - rewrite 'decodenetnum()' in terms of inet_pton * [Bug 3666] avoid unlimited receive buffer allocation - limit number of receive buffers, with an iron reserve for refclocks * [Bug 3664] Enable openSSL CMAC support on Windows diff --cc NEWS index 6a2b65088,d2527a203..e280a66e7 --- a/NEWS +++ b/NEWS @@@ -10,9 -10,10 +10,11 @@@ authentication between ntpd from versio 4.2.8p14/4.3.100 will leak a small amount of memory for each packet. Eventually, ntpd will run out of memory and abort. - It also fixes 10 other bugs. + It also fixes 11 other bugs. +* [Sec 3661] memory leak with AES128CMAC keys + * [Bug 3667] decodenetnum fails with numeric port + - rewrite 'decodenetnum()' in terms of inet_pton * [Bug 3666] avoid unlimited receive buffer allocation - limit number of receive buffers, with an iron reserve for refclocks * [Bug 3664] Enable openSSL CMAC support on Windows