[ntp:bugs] [Bug 3059] Potential buffer overrun from oversized hash

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Tue May 31 08:34:14 UTC 2016


http://bugs.ntp.org/show_bug.cgi?id=3059

Harlan Stenn <stenn at ntp.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
           Priority|P5                          |P3
              Flags|                            |blocking4.2.8+

--- Comment #1 from Harlan Stenn <stenn at ntp.org> 2016-05-31 08:34:14 UTC ---
Brian,

Thanks for the catch.  This code comes from July of 2000.

The good news is that yours is the first bug report about it, and since it's
always cause for an exit(-1), there's pretty much no chance of damage.

-- 
Configure bugmail: http://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.


More information about the bugs-announce mailing list