* [Sec 3565] Crafted null dereference attack in authenticated
mode 6 packet <perlinger@ntp.org>
- reported by Magnus Stubman
+* [Bug 3613] Propagate noselect to mobilized pool servers <stenn@ntp.org>
* [Bug 3560] Fix build when HAVE_DROPROOT is not defined <perlinger@ntp.org>
- applied patch by Ian Lepore
* [Bug 3558] Crash and integer size bug <perlinger@ntp.org>
peer = newpeer(&rbufp->recv_srcadr, NULL, rbufp->dstadr,
r4a.ippeerlimit, MODE_CLIENT, hisversion,
peer2->minpoll, peer2->maxpoll,
- FLAG_PREEMPT | (FLAG_IBURST & peer2->flags),
+ ( FLAG_PREEMPT
+ | (FLAG_IBURST & peer2->flags)
+ | (FLAG_NOSELECT & peer2->flags)
+ ),
MDF_UCAST | MDF_UCLNT, 0, skeyid, sys_ident);
if (NULL == peer) {
DPRINTF(2, ("receive: AM_MANYCAST drop: duplicate\n"));