Martin Stransky wrote:

Hello,

there is a new bug, buffer overflow, it's in 3.9.3 too.

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=164227

OK, I've checked in (a variant of) Ulrich's fix - but, as I noted in that bug, I'm not sure how a string could've been long enough to overflow that buffer; if it *is* possible, the buffer should probably be made bigger, so the string doesn't get cut off.
-
This is the tcpdump-workers list.
Visit https://lists.sandelman.ca/ to unsubscribe.

Reply via email to