Subject: bin/11004: skey segfaults when passed passphrase on command line
To: None <gnats-bugs@gnats.netbsd.org>
From: TheMan <atatat@atatdot.net>
List: netbsd-bugs
Date: 09/13/2000 08:36:30
>Number: 11004
>Category: bin
>Synopsis: skey segfaults when passed passphrase on command line
>Confidential: no
>Severity: critical
>Priority: high
>Responsible: bin-bug-people
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Wed Sep 13 08:37:01 PDT 2000
>Closed-Date:
>Last-Modified:
>Originator: TheMan
>Release: 20000825
>Organization:
NetBSD 1.5E (RESTON) #25: Fri Aug 18 17:27:29 EDT 2000
Remember...Ebola is a river in Africa.
>Environment:
System: NetBSD ebola 1.5E NetBSD 1.5E (RESTON) #25: Fri Aug 18 17:27:29 EDT 2000 andrew@ebola:/usr/src/sys/arch/i386/compile/RESTON i386
>Description:
skey seg faults when passed the pass phrase via the command line.
i realize mjl may have been trying to "discourage" this particular
use of skey, but i think it's just a thinko.
>How-To-Repeat:
skey -p foo
>Fix:
--- skey.c-orig Tue Jul 25 12:47:09 2000
+++ skey.c Wed Sep 13 11:31:10 2000
@@ -53,7 +53,7 @@
cnt = atoi(optarg);
break;
case 'p':
- if (strlcpy(passwd, argv[++i], sizeof(passwd)) >=
+ if (strlcpy(passwd, optarg, sizeof(passwd)) >=
sizeof(passwd))
errx(1, "Password too long");
pass = 1;
>Release-Note:
>Audit-Trail:
>Unformatted: