[ntp:security] [Bug 2669] buffer overflow: configure()

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Wed Nov 12 08:45:04 UTC 2014


--- Comment #2 from Harlan Stenn <stenn at ntp.org> 2014-11-12 08:45:04 UTC ---

If the requested transfer will exceed the buffer should we truncate?  Reject
the request?

Configure bugmail: http://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.

More information about the security mailing list