On 09/13/16 12:07 PM, Alexander Pyhalov wrote:
On 09/12/16 10:53 PM, Alex Wilson wrote:
On 9/12/16 6:23 AM, Alexander Pyhalov wrote:
This makes me wonder, why we check for adt_* return codes, but don't
return from function at
and in similar places.
Yeah that's bad. We should fix that. Do you want to do up a revised
version of the patch or shall I?
I think when I initially read this patch while including it from the
Oracle stack I thought the error() calls were fatal() (which exits after
printing). Bit of an oversight.
Does this fix seem reasonable
After discussion with Dan, I think OpenSSH can still leak tid when
connection was succesfully logged, but there was no authorization.
In this case, as we see here:
tid will not be freed.
What do you think about this?
system administrator of Southern Federal University IT department
RSS Feed: https://www.listbox.com/member/archive/rss/182180/21175430-2e6923be
Modify Your Subscription:
Powered by Listbox: http://www.listbox.com