Hi Nigel, * Nigel Horne <[EMAIL PROTECTED]> [2007-12-29 17:11]: > >buf[nbytes-1] = '\0'; should do the trick. > > Wrong, that will now add the nul byte one byte too early. > > There is a low-priority bug around here, fixed by changing > nbytes = clamd_recv(sock, buf, sizeof(buf); > to > nbytes = clamd_recv(sock, buf, sizeof(buf) - 1);
http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=%2Ftrunk%2Fclamav-milter%2Fclamav-milter.c&rev=3468&sc=1 http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=%2Ftrunk%2Fclamav-milter%2Fclamav-milter.c&rev=3469&sc=1 X-P > There is no real-world issue here though, so no need to panic. Its fun to hear that so confident from you since thats not what the diff shows ;) * TODO: is it possible (desirable?) to determine if the remote machine has been * compromised? */ Cheers Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpEVloZM4Znb.pgp
Description: PGP signature