[ntp:security] [Bug 2630] buffer overrun in tokenize()

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Wed Aug 6 02:36:56 UTC 2014


Danny Mayer <mayer at ntp.org> changed:

           What    |Removed                     |Added
                 CC|                            |mayer at ntp.org

--- Comment #2 from Danny Mayer <mayer at ntp.org> 2014-08-06 02:36:56 UTC ---
I am not sure why this would be considered a security bug since ntpq is purely
a client tool and not the daemon. This buffer overrun does need to be fixed.
Maybe you can explain in some detail why this would be a security issue.


Configure bugmail: http://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.

More information about the security mailing list