Date: Wed, 22 Dec 2010 22:21:46 GMT From: David Boyd <David.Boyd@insightbb.com> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/153382: apg -y generates segfault Message-ID: <201012222221.oBMMLkS4059085@red.freebsd.org> Resent-Message-ID: <201012222230.oBMMUBHp022120@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 153382 >Category: ports >Synopsis: apg -y generates segfault >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Dec 22 22:30:11 UTC 2010 >Closed-Date: >Last-Modified: >Originator: David Boyd >Release: 7.3-RELEASE-p4 >Organization: Boyd Consulting Services, LLC >Environment: FreeBSD free.bsd1.net 7.3-RELEASE-p4 FreeBSD 7.3-RELEASE-p4 #0: Tue Nov 30 10:25:51 EST 2010 root@free.bsd1.net:/usr/obj/var/cvsup/usr/src/sys/X7SB4 i386 >Description: apg -y results in segfault. This appears to be identical to Debian bug #337116 which describes character buffer "salt" as being one byte too small. I modified apg.c from "char salt[10];" to "char salt[11];" and output appears to be correct. This problem does not occur with 6.4-RELEASE-p11, but does occur with 8.1-RELEASE-p2. >How-To-Repeat: install port security/apg. run "apg -d -y -n1". >Fix: See above description. >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201012222221.oBMMLkS4059085>