received. Otherwise an unauthenticated peer can repeat the KEXINIT and cause
allocation of up to 128MB -- until the connection is closed. Reported by
shilei-c at 360.cn
|
||
---|---|---|
.. | ||
100-openssh-7.3_p1-NEWKEYS_null_deref.patch | ||
101-Unregister-the-KEXINIT-handler-after-receive.patch | ||
130-implicit_memset_decl_fix.patch | ||
140-pam_uclibc_pthreads_fix.patch | ||
200-dscp-qos.patch |