[ntp:security] [Bug 2669] buffer overflow: configure()

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Wed Nov 12 09:40:13 UTC 2014


http://bugs.ntp.org/show_bug.cgi?id=2669

--- Comment #3 from Stephen Röttger <stephen.roettger at gmail.com> 2014-11-12 09:40:13 UTC ---
I think rejecting the request is the better approach.
E.g. what if I have restrict statements:
restrict default nomodify
restrict myip
and the second line gets cut off. In that case, I'll lose access.

-- 
Configure bugmail: http://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.


More information about the security mailing list