Blame SOURCES/ntp-4.2.6p5-cve-2015-1799.patch

6e16f6
diff -up ntp-4.2.6p5/ntpd/ntp_proto.c.cve-2015-1799 ntp-4.2.6p5/ntpd/ntp_proto.c
6e16f6
--- ntp-4.2.6p5/ntpd/ntp_proto.c.cve-2015-1799	2015-04-08 13:06:43.083810350 +0200
6e16f6
+++ ntp-4.2.6p5/ntpd/ntp_proto.c	2015-04-08 13:08:12.679980322 +0200
6e16f6
@@ -1101,16 +1101,6 @@ receive(
6e16f6
 	}
6e16f6
 
6e16f6
 	/*
6e16f6
-	 * Update the state variables.
6e16f6
-	 */
6e16f6
-	if (peer->flip == 0) {
6e16f6
-		if (hismode != MODE_BROADCAST)
6e16f6
-			peer->rec = p_xmt;
6e16f6
-		peer->dst = rbufp->recv_time;
6e16f6
-	}
6e16f6
-	peer->xmt = p_xmt;
6e16f6
-
6e16f6
-	/*
6e16f6
 	 * If this is a crypto_NAK, the server cannot authenticate a
6e16f6
 	 * client packet. The server might have just changed keys. Clear
6e16f6
 	 * the association and restart the protocol.
6e16f6
@@ -1157,6 +1147,16 @@ receive(
6e16f6
 	}
6e16f6
 
6e16f6
 	/*
6e16f6
+	 * Update the state variables.
6e16f6
+	 */
6e16f6
+	if (peer->flip == 0) {
6e16f6
+		if (hismode != MODE_BROADCAST)
6e16f6
+			peer->rec = p_xmt;
6e16f6
+		peer->dst = rbufp->recv_time;
6e16f6
+	}
6e16f6
+	peer->xmt = p_xmt;
6e16f6
+
6e16f6
+	/*
6e16f6
 	 * Set the peer ppoll to the maximum of the packet ppoll and the
6e16f6
 	 * peer minpoll. If a kiss-o'-death, set the peer minpoll to
6e16f6
 	 * this maximumn and advance the headway to give the sender some