Martin Stransky wrote:
Hello,there is a new bug, buffer overflow, it's in 3.9.3 too. https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=164227
OK, I've checked in (a variant of) Ulrich's fix - but, as I noted in that bug, I'm not sure how a string could've been long enough to overflow that buffer; if it *is* possible, the buffer should probably be made bigger, so the string doesn't get cut off.
- This is the tcpdump-workers list. Visit https://lists.sandelman.ca/ to unsubscribe.