[ntp:security] [Bug 3072] Attack on interface selection

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Mon Sep 12 17:37:06 UTC 2016


https://bugs.ntp.org/show_bug.cgi?id=3072

--- Comment #6 from Miroslav Lichvar <mlichvar at redhat.com> 2016-09-12 17:37:06 UTC ---
(In reply to comment #5)
> If this is this about the line
> 
>     if (p == NULL || p->dstadr == dstadr)
> 
> then I do no not see how this could prevent 'dstaddr' from becoming NULL. Or am
> I missing something here? This just avoids a possible NULL pointer access.

You are right. I thought it was checking dstadr. Sorry for the confusion.

-- 
Configure bugmail: https://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.


More information about the security mailing list