[ntp:security] [Bug 2669] buffer overflow: configure()

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Wed Nov 12 08:45:04 UTC 2014


http://bugs.ntp.org/show_bug.cgi?id=2669

--- Comment #2 from Harlan Stenn <stenn at ntp.org> 2014-11-12 08:45:04 UTC ---
Stephen,

If the requested transfer will exceed the buffer should we truncate?  Reject
the request?

-- 
Configure bugmail: http://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.


More information about the security mailing list