[Bug 1380] incorrect check for strlen(fwd->connect_host) in parse_forward()
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Fri Jul 4 14:14:10 EST 2008
https://bugzilla.mindrot.org/show_bug.cgi?id=1380
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #1367|0 |1
is obsolete| |
Attachment #1539| |ok?
Flag| |
--- Comment #5 from Damien Miller <djm at mindrot.org> 2008-07-04 14:14:06 ---
Created an attachment (id=1539)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=1539)
revised patch
I think this would be better. btw, there was a bug in your change to
channels.c:channel_request_remote_forwarding() - it returned 0
(success) instead of -1 (failure) when a too-long listen_host was
supplied.
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
More information about the openssh-bugs
mailing list