[Bug 1380] incorrect check for strlen(fwd->connect_host) in	parse_forward()
    bugzilla-daemon at bugzilla.mindrot.org 
    bugzilla-daemon at bugzilla.mindrot.org
       
    Fri Jul  4 14:14:10 EST 2008
    
    
  
https://bugzilla.mindrot.org/show_bug.cgi?id=1380
Damien Miller <djm at mindrot.org> changed:
           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #1367|0                           |1
        is obsolete|                            |
   Attachment #1539|                            |ok?
               Flag|                            |
--- Comment #5 from Damien Miller <djm at mindrot.org>  2008-07-04 14:14:06 ---
Created an attachment (id=1539)
 --> (http://bugzilla.mindrot.org/attachment.cgi?id=1539)
revised patch
I think this would be better. btw, there was a bug in your change to
channels.c:channel_request_remote_forwarding() - it returned 0
(success) instead of -1 (failure) when a too-long listen_host was
supplied.
-- 
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
    
    
More information about the openssh-bugs
mailing list