Blame SOURCES/ntp-4.2.6p5-cve-2015-1799.patch

2b78f7
diff -up ntp-4.2.6p5/ntpd/ntp_proto.c.cve-2015-1799 ntp-4.2.6p5/ntpd/ntp_proto.c
2b78f7
--- ntp-4.2.6p5/ntpd/ntp_proto.c.cve-2015-1799	2015-04-08 13:06:43.083810350 +0200
2b78f7
+++ ntp-4.2.6p5/ntpd/ntp_proto.c	2015-04-08 13:08:12.679980322 +0200
2b78f7
@@ -1101,16 +1101,6 @@ receive(
2b78f7
 	}
2b78f7
 
2b78f7
 	/*
2b78f7
-	 * Update the state variables.
2b78f7
-	 */
2b78f7
-	if (peer->flip == 0) {
2b78f7
-		if (hismode != MODE_BROADCAST)
2b78f7
-			peer->rec = p_xmt;
2b78f7
-		peer->dst = rbufp->recv_time;
2b78f7
-	}
2b78f7
-	peer->xmt = p_xmt;
2b78f7
-
2b78f7
-	/*
2b78f7
 	 * If this is a crypto_NAK, the server cannot authenticate a
2b78f7
 	 * client packet. The server might have just changed keys. Clear
2b78f7
 	 * the association and restart the protocol.
2b78f7
@@ -1157,6 +1147,16 @@ receive(
2b78f7
 	}
2b78f7
 
2b78f7
 	/*
2b78f7
+	 * Update the state variables.
2b78f7
+	 */
2b78f7
+	if (peer->flip == 0) {
2b78f7
+		if (hismode != MODE_BROADCAST)
2b78f7
+			peer->rec = p_xmt;
2b78f7
+		peer->dst = rbufp->recv_time;
2b78f7
+	}
2b78f7
+	peer->xmt = p_xmt;
2b78f7
+
2b78f7
+	/*
2b78f7
 	 * Set the peer ppoll to the maximum of the packet ppoll and the
2b78f7
 	 * peer minpoll. If a kiss-o'-death, set the peer minpoll to
2b78f7
 	 * this maximumn and advance the headway to give the sender some