[ntp:security] [Bug 2667] Buffer overflow in crypto_recv()

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Mon Nov 24 15:18:30 UTC 2014


--- Comment #1 from Stephen Röttger <stephen.roettger at gmail.com> 2014-11-24 15:18:30 UTC ---
Created attachment 1161
  --> http://bugs.ntp.org/attachment.cgi?id=1161
allocate the buffer for the cookie dynamically

I haven't tested this patch, it would be good if someone with a working Autokey
setup could do that (the patch is quite simple though).

Configure bugmail: http://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.

More information about the security mailing list