From 9696842a61b6608f10633a984732a145c4fe5c68 Mon Sep 17 00:00:00 2001 From: KatolaZ Date: Fri, 8 Feb 2019 05:14:29 +0000 Subject: add debian/ folder --- debian/patches/05-547014-netgroup.patch | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 debian/patches/05-547014-netgroup.patch (limited to 'debian/patches/05-547014-netgroup.patch') diff --git a/debian/patches/05-547014-netgroup.patch b/debian/patches/05-547014-netgroup.patch new file mode 100644 index 0000000..8667a39 --- /dev/null +++ b/debian/patches/05-547014-netgroup.patch @@ -0,0 +1,27 @@ +http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=547014 + +From: "Matthew A. Dunford" + +finger segfaults when it comes across a netgroup entry in /etc/passwd. +A netgroup entry doesn't include many of the fields in a normal passwd +entry, so pw->pw_gecos is set to NULL, which causes finger to core +dump. + +Here is part of a /etc/passwd file with a netgroup entry: + +nobody:x:65534:65534:nobody:/nonexistent:/bin/sh ++@operator + +This patch sidesteps what finger considers a malformed passwd entry: + +--- a/finger/util.c 1999-09-29 08:53:58.000000000 +1000 ++++ b/finger/util.c 2010-02-12 16:08:50.000000000 +1100 +@@ -178,6 +180,8 @@ match(struct passwd *pw, const char *use + int i, j, ct, rv=0; + char *rname; + ++ if (pw->pw_gecos == NULL) return 0; ++ + strncpy(tbuf, pw->pw_gecos, TBUFLEN); + tbuf[TBUFLEN-1] = 0; /* guarantee null termination */ + p = tbuf; -- cgit v1.2.3