From: Harlan Stenn Date: Sat, 13 Feb 2016 09:15:45 +0000 (+0000) Subject: Fix some Credit: attributions in the NEWS file. Harlan Stenn. X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=c238cb2b70acdbb7c185f564573cad27b922c22c;p=thirdparty%2Fntp.git Fix some Credit: attributions in the NEWS file. Harlan Stenn. bk: 56bef441s4JyIWZxkgO5RXy-RQNT3Q --- diff --git a/ChangeLog b/ChangeLog index b5ae3325c..26e7d123c 100644 --- a/ChangeLog +++ b/ChangeLog @@ -3,6 +3,7 @@ * [Bug 2994] Systems with HAVE_SIGNALED_IO fail to compile. perlinger@ntp.org * [Bug 2995] Fixes to compile on Windows * Document ntp.key's optional IP list in authenetic.html. Harlan Stenn. +* Fix some Credit: attributions in the NEWS file. Harlan Stenn. --- (4.2.8p6) 2016/01/20 Released by Harlan Stenn diff --git a/NEWS b/NEWS index 278943c7b..570f5e4d2 100644 --- a/NEWS +++ b/NEWS @@ -53,7 +53,8 @@ following X low- and Y medium-severity vulnerabilities: Upgrade to 4.2.8p6, or later, from the NTP Project Download Page or the NTP Public Services Project Download Page. Monitor your 'ntpd= instances. - Credit: This weakness was discovered by Jonathan Gardner of Cisco ASIG. + Credit: This weakness was discovered by Matthey Van Gundy and + Jonathan Gardner of Cisco ASIG. * Stack exhaustion in recursive traversal of restriction list Date Resolved: Stable (4.2.8p6) 19 Jan 2016 @@ -689,7 +690,7 @@ Credit: This weakness was discovered by Aleksandar Nikolic of Cisco Talos. Apply the patch to the bottom of the "authentic" check block around line 1136 of ntp_proto.c. Monitor your ntpd instances. - Credit: This weakness was discovered by Stephen Gray . + Credit: This weakness was discovered by Matthew Van Gundy of Cisco ASIG. Backward-Incompatible changes: * [Bug 2817] Default on Linux is now "rlimit memlock -1".