![Jim Somerville](/assets/img/avatar_default.png)
This solves: ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of service or code execution (CVE-2018-12327) See the announcement link: https://lists.centos.org/pipermail/centos-cr-announce/2019-August/006016.html for more details. Here we refresh the meta patches and correct the crime of "name of patch file differs from git format-patch". We also clean up the commit short logs. Change-Id: I263465d85f06096296fdd478a302eb110ab1259c Closes-Bug: 1849197 Depends-On: https://review.opendev.org/#/c/695983 Signed-off-by: Jim Somerville <Jim.Somerville@windriver.com>
integ
StarlingX Integration
Description
Languages
Shell
33.1%
JavaScript
24.1%
Perl
14.3%
Python
10.3%
Makefile
6.6%
Other
11.5%