It fails on line 264 on if(read(conn, &req, SIZEOF_NTPCM(req)) == -1)
Upstream bug is: http://sourceforge.net/tracker/?func=detail&atid=397597&aid=1999319&group_id=29880
It's closed by saying the bug is in _FORTIFY_SOURCE, as the author checked that the "read" call should not exceed allocated value.
"check_ntp" doesn't fail so it can be used as a workaround.
It fails on line 264 on
if(read(conn, &req, SIZEOF_NTPCM(req)) == -1)
Upstream bug is: sourceforge. net/tracker/ ?func=detail& atid=397597& aid=1999319& group_id= 29880
http://
It's closed by saying the bug is in _FORTIFY_SOURCE, as the author checked that the "read" call should not exceed allocated value.
"check_ntp" doesn't fail so it can be used as a workaround.