Date: Sat, 6 Sep 2008 08:04:01 +0200 (CEST) From: freebsdntpd@oldach.net (Helge Oldach) To: FreeBSD-gnats-submit@FreeBSD.org, freebsd-bugs@FreeBSD.org Cc: Ollivier Robert <roberto@FreeBSD.org> Subject: Re: bin/92839: contrib/ntp PARSE buffer overrun [patch] Message-ID: <200809060604.m86642xN005776@sep.oldach.net> In-Reply-To: <200602051330.k15DU3DT001208@freefall.freebsd.org> from "FreeBSD-gnats-submit@FreeBSD.org" at "5 Feb 2006 13:30:03"
next in thread | previous in thread | raw e-mail | index | archive | help
After Ollivier's recent update of ntp two buffer overruns still remain. The patch below fixes them: --- clk_rawdcf.c 2008-09-06 07:59:47.000000000 +0200 +++ clk_rawdcf.c.ctm 2008-09-04 23:01:34.000000000 +0200 @@ -229,7 +229,7 @@ unsigned char *c = dcfprm->zerobits; int i; - parseprintf(DD_RAWDCF,("parse: convert_rawdcf: \"%.*s\"\n", size, buffer)); + parseprintf(DD_RAWDCF,("parse: convert_rawdcf: \"%s\"\n", buffer)); if (size < 57) { @@ -320,7 +320,7 @@ * bad format - not for us */ #ifndef PARSEKERNEL - msyslog(LOG_ERR, "parse: convert_rawdcf: parity check FAILED for \"%.*s\"\n", size, buffer); + msyslog(LOG_ERR, "parse: convert_rawdcf: parity check FAILED for \"%s\"\n", buffer); #endif return CVT_FAIL|CVT_BADFMT; }
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200809060604.m86642xN005776>