Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 04 Apr 2001 17:23:21 -0700
From:      Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>
To:        Poul-Henning Kamp <phk@critter.freebsd.dk>
Cc:        Eli Dart <dart@nersc.gov>, freebsd-security@FreeBSD.ORG, pat@databits.net
Subject:   Re: Fwd: ntpd =< 4.0.99k remote buffer overflow 
Message-ID:  <200104050024.f350OKC50297@cwsys.cwsent.com>
In-Reply-To: Your message of "Thu, 05 Apr 2001 02:14:08 %2B0200." <52875.986429648@critter> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <52875.986429648@critter>, Poul-Henning Kamp writes:
> In message <20010405001019.935A027@usul.nersc.gov>, Eli Dart writes:
> >--==_Exmh_854596055P
> >Content-Type: text/plain; charset=us-ascii
> >
> >Any chance these changes could be propagated to the port?  It's still 
> >4.0.99k as of 5 minutes ago....ipf rules work in some cases, but not 
> >all......
> 
> Sure, pull the patch out of the cvs tree:
> 
> 	http://www.freebsd.org/cgi/cvsweb.cgi/src/contrib/ntp/ntpd/ntp_control.
> c.diff?r1=1.1&r2=1.2
> 
> It should apply with no problems....
> 
> I have to hit the hay now, so somebody else gets to do the honours...

I've got a 4.0.99k port with the patch ready to go.  Who can I send to 
get committed?  Been using it, sans the security patch of course, since 
November -- well tested.


Regards,                         Phone:  (250)387-8437
Cy Schubert                        Fax:  (250)387-5766
Team Leader, Sun/Alpha Team   Internet:  Cy.Schubert@osg.gov.bc.ca
Open Systems Group, ITSD, ISTA
Province of BC



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200104050024.f350OKC50297>