[ntp:security] [Bug 2630] buffer overrun in tokenize()

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Tue Aug 5 19:29:55 UTC 2014


http://bugs.ntp.org/show_bug.cgi?id=2630

Brian Utterback <brian.utterback at oracle.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |security at ntp.org
          Component|ntpq                        |Security Bugs

--- Comment #1 from Brian Utterback <brian.utterback at oracle.com> 2014-08-05 19:29:55 UTC ---
I wasn't sure how to set this as a security bug but I see now. Oracle considers
this security bug since it is not always obvious whether or not a buffer
overflow can be exploited.

-- 
Configure bugmail: http://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.


More information about the security mailing list