https://bugzilla.mindrot.org/show_bug.cgi?id=2473
Gerik Bonaert <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |[email protected] --- Comment #3 from Gerik Bonaert <[email protected]> --- I have tested this patch against the version of OpenSSH distributed in Ubuntu 16.04 (7.2p2). It works quite well, but I had to make some small changes: On line 1353, I believe it should be: if (arg == NULL || *arg == '\0') instead of: if (arg == NULL || *arg != '\0') I was also wondering why we cannot enforce these limitations for the loopback addresses as well? if (type == SSH_CHANNEL_RPORT_LISTENER && !is_loopback && fwd_opts->gateway_ports_explicit != NULL && addr_match_cidr_list(ntop, fwd_opts->gateway_ports_explicit) != 1) { -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug. _______________________________________________ openssh-bugs mailing list [email protected] https://lists.mindrot.org/mailman/listinfo/openssh-bugs
