FreeBSD Security Advisory FreeBSD-SA-14:31.ntp

Remko Lodder remko at FreeBSD.org
Thu Dec 25 19:37:05 UTC 2014


> On 25 Dec 2014, at 18:46, Darren Pilgrim <list_freebsd at bluerosetech.com> wrote:
> 
> On 12/23/2014 3:33 PM, FreeBSD Security Advisories wrote:
>> IV.  Workaround
>> 
>> No workaround is available,
> 
> This was fixed in ports/net/ntp on Dec 20, so a workaround exists in the form of disabling the in-base version and installing the port.  In the future, it would be helpful to mention such.

We talk explicitly about the base system, not about ports. We never mentioned them and I do not see a reason to start doing so.

That is my personal opinion though, it could be that others think different and they are ofcourse entitled to do so.

--
/"\   Best regards,                      | remko at FreeBSD.org
\ /   Remko Lodder                       | remko at EFnet
 X    http://www.evilcoder.org/          |
/ \   ASCII Ribbon Campaign              | Against HTML Mail and News

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 841 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.freebsd.org/pipermail/freebsd-security/attachments/20141225/7e17331b/attachment.sig>


More information about the freebsd-security mailing list