Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 05 Apr 2001 02:14:08 +0200
From:      Poul-Henning Kamp <phk@critter.freebsd.dk>
To:        Eli Dart <dart@nersc.gov>
Cc:        freebsd-security@FreeBSD.ORG, pat@databits.net
Subject:   Re: Fwd: ntpd =< 4.0.99k remote buffer overflow 
Message-ID:  <52875.986429648@critter>
In-Reply-To: Your message of "Wed, 04 Apr 2001 17:10:19 PDT." <20010405001019.935A027@usul.nersc.gov> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <20010405001019.935A027@usul.nersc.gov>, Eli Dart writes:
>--==_Exmh_854596055P
>Content-Type: text/plain; charset=us-ascii
>
>Any chance these changes could be propagated to the port?  It's still 
>4.0.99k as of 5 minutes ago....ipf rules work in some cases, but not 
>all......

Sure, pull the patch out of the cvs tree:

	http://www.freebsd.org/cgi/cvsweb.cgi/src/contrib/ntp/ntpd/ntp_control.c.diff?r1=1.1&r2=1.2

It should apply with no problems....

I have to hit the hay now, so somebody else gets to do the honours...

--
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk@FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?52875.986429648>