Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 1 Nov 2015 20:34:55 +0000 (UTC)
From:      Christian Weisgerber <naddy@mips.inka.de>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-15:25.ntp
Message-ID:  <slrnn3ctrf.is2.naddy@lorvorc.mips.inka.de>
References:  <201510261236.t9QCa2xj044234@think.nginx.com>

next in thread | previous in thread | raw e-mail | index | archive | help
>=============================================================================
> FreeBSD-SA-15:25.ntp                                        Security Advisory
>                                                           The FreeBSD Project
>
> Topic:          Multiple vulnerabilities of ntp
>
> Category:       contrib
> Module:         ntp
> Announced:      2015-10-26
> Credits:        Network Time Foundation
> Affects:        All supported versions of FreeBSD.
> Corrected:      2015-10-26 11:35:40 UTC (stable/10, 10.2-STABLE)
>                 2015-10-26 11:36:55 UTC (releng/10.2, 10.2-RELEASE-p6)
>                 2015-10-26 11:37:31 UTC (releng/10.1, 10.1-RELEASE-p23)

Unfortunately, this update has now lost support for RAWDCF refclocks
in 10.1.

> # fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-101.patch.bz2

It's right there in /usr.sbin/ntp/config.h:

 /* DCF77 raw time code */
-#define CLOCK_RAWDCF 1
+/* #undef CLOCK_RAWDCF */

I have opened bug #204203 about this.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=204203

-- 
Christian "naddy" Weisgerber                          naddy@mips.inka.de



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?slrnn3ctrf.is2.naddy>