Date: Sun, 1 Nov 2015 20:34:55 +0000 (UTC) From: Christian Weisgerber <naddy@mips.inka.de> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-15:25.ntp Message-ID: <slrnn3ctrf.is2.naddy@lorvorc.mips.inka.de> References: <201510261236.t9QCa2xj044234@think.nginx.com>
next in thread | previous in thread | raw e-mail | index | archive | help
>============================================================================= > FreeBSD-SA-15:25.ntp Security Advisory > The FreeBSD Project > > Topic: Multiple vulnerabilities of ntp > > Category: contrib > Module: ntp > Announced: 2015-10-26 > Credits: Network Time Foundation > Affects: All supported versions of FreeBSD. > Corrected: 2015-10-26 11:35:40 UTC (stable/10, 10.2-STABLE) > 2015-10-26 11:36:55 UTC (releng/10.2, 10.2-RELEASE-p6) > 2015-10-26 11:37:31 UTC (releng/10.1, 10.1-RELEASE-p23) Unfortunately, this update has now lost support for RAWDCF refclocks in 10.1. > # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-101.patch.bz2 It's right there in /usr.sbin/ntp/config.h: /* DCF77 raw time code */ -#define CLOCK_RAWDCF 1 +/* #undef CLOCK_RAWDCF */ I have opened bug #204203 about this. https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=204203 -- Christian "naddy" Weisgerber naddy@mips.inka.de
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?slrnn3ctrf.is2.naddy>