Hi Nigel,
* Nigel Horne <[EMAIL PROTECTED]> [2007-12-29 17:11]:
> >buf[nbytes-1] = '\0'; should do the trick.
> 
> Wrong, that will now add the nul byte one byte too early.
> 
> There is a low-priority bug around here, fixed by changing
>       nbytes = clamd_recv(sock, buf, sizeof(buf);
> to
>       nbytes = clamd_recv(sock, buf, sizeof(buf) - 1);

http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=%2Ftrunk%2Fclamav-milter%2Fclamav-milter.c&rev=3468&sc=1
http://svn.clamav.net/websvn/diff.php?repname=clamav-devel&path=%2Ftrunk%2Fclamav-milter%2Fclamav-milter.c&rev=3469&sc=1

X-P

> There is no real-world issue here though, so no need to panic.

Its fun to hear that so confident from you since thats not what the diff shows 
;)
* TODO: is it possible (desirable?) to determine if the remote machine has been
*  compromised?
*/

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpEVloZM4Znb.pgp
Description: PGP signature

Reply via email to