Date: Fri, 6 Apr 2001 18:01:59 -0500 From: "Steven Petmecky" <petmecky@support.accessus.net> To: <freebsd-questions@freebsd.org> Subject: NTPD 4.0.99k Patch? Message-ID: <007701c0beed$96096aa0$1eabcecf@accessus.net>
index | next in thread | raw e-mail
[-- Attachment #1 --] Does anyone have a fully patched tarball of the ntpd 4.0.99k FreeBSD port, that fixes the remote buffer overflow exploit? I've got timeservers I really need to put back into service. [-- Attachment #2 --] <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML><HEAD> <META http-equiv=Content-Type content="text/html; charset=iso-8859-1"> <META content="MSHTML 5.50.4611.1300" name=GENERATOR> <STYLE></STYLE> </HEAD> <BODY bgColor=#ffffff> <DIV><FONT face=Arial size=2>Does anyone have a fully patched tarball of the ntpd 4.0.99k FreeBSD port, that fixes the remote buffer overflow exploit? I've got timeservers I really need to put back into service.</FONT></DIV> <DIV><FONT face=Arial size=2></FONT> </DIV> <DIV><FONT face=Arial size=2></FONT> </DIV> <DIV><FONT size=2></FONT> </DIV></BODY></HTML>home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?007701c0beed$96096aa0$1eabcecf>
