diff options
author | roberto <roberto@FreeBSD.org> | 2009-12-12 22:29:30 +0000 |
---|---|---|
committer | roberto <roberto@FreeBSD.org> | 2009-12-12 22:29:30 +0000 |
commit | 76d0d9559c6c64adb0eec290749ddb0bc85c99ec (patch) | |
tree | 5a9f13891d1608baf9ad2436ec526b57ad47d3e6 /libparse/clk_rawdcf.c | |
parent | c5461d7d838ecf010f9a551e548b1330f2201aaa (diff) | |
download | FreeBSD-src-76d0d9559c6c64adb0eec290749ddb0bc85c99ec.zip FreeBSD-src-76d0d9559c6c64adb0eec290749ddb0bc85c99ec.tar.gz |
Update ntp vendor code to 4.2.4p8.
This is mainly to fix CVE-2009-3563, a remote DOS.
MFC after: 3 days
Security: CVE-2009-3563
Diffstat (limited to 'libparse/clk_rawdcf.c')
-rw-r--r-- | libparse/clk_rawdcf.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/libparse/clk_rawdcf.c b/libparse/clk_rawdcf.c index 3465e8d..3ef36c4 100644 --- a/libparse/clk_rawdcf.c +++ b/libparse/clk_rawdcf.c @@ -229,7 +229,7 @@ convert_rawdcf( unsigned char *c = dcfprm->zerobits; int i; - parseprintf(DD_RAWDCF,("parse: convert_rawdcf: \"%.*s\"\n", size, buffer)); + parseprintf(DD_RAWDCF,("parse: convert_rawdcf: \"%s\"\n", buffer)); if (size < 57) { @@ -320,7 +320,7 @@ convert_rawdcf( * bad format - not for us */ #ifndef PARSEKERNEL - msyslog(LOG_ERR, "parse: convert_rawdcf: parity check FAILED for \"%.*s\"\n", size, buffer); + msyslog(LOG_ERR, "parse: convert_rawdcf: parity check FAILED for \"%s\"\n", buffer); #endif return CVT_FAIL|CVT_BADFMT; } |