Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 6 Sep 2008 08:04:01 +0200 (CEST)
From:      freebsdntpd@oldach.net (Helge Oldach)
To:        FreeBSD-gnats-submit@FreeBSD.org, freebsd-bugs@FreeBSD.org
Cc:        Ollivier Robert <roberto@FreeBSD.org>
Subject:   Re: bin/92839: contrib/ntp PARSE buffer overrun [patch]
Message-ID:  <200809060604.m86642xN005776@sep.oldach.net>
In-Reply-To: <200602051330.k15DU3DT001208@freefall.freebsd.org> from "FreeBSD-gnats-submit@FreeBSD.org" at "5 Feb 2006 13:30:03"

next in thread | previous in thread | raw e-mail | index | archive | help
After Ollivier's recent update of ntp two buffer overruns still remain.
The patch below fixes them:


--- clk_rawdcf.c	2008-09-06 07:59:47.000000000 +0200
+++ clk_rawdcf.c.ctm	2008-09-04 23:01:34.000000000 +0200
@@ -229,7 +229,7 @@
 	unsigned char *c = dcfprm->zerobits;
 	int i;
 
-	parseprintf(DD_RAWDCF,("parse: convert_rawdcf: \"%.*s\"\n", size, buffer));
+	parseprintf(DD_RAWDCF,("parse: convert_rawdcf: \"%s\"\n", buffer));
 
 	if (size < 57)
 	{
@@ -320,7 +320,7 @@
 		 * bad format - not for us
 		 */
 #ifndef PARSEKERNEL
-		msyslog(LOG_ERR, "parse: convert_rawdcf: parity check FAILED for \"%.*s\"\n", size, buffer);
+		msyslog(LOG_ERR, "parse: convert_rawdcf: parity check FAILED for \"%s\"\n", buffer);
 #endif
 		return CVT_FAIL|CVT_BADFMT;
 	}



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200809060604.m86642xN005776>