Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 15 May 2023 07:09:09 +0000
From:      bugzilla-noreply@freebsd.org
To:        standards@FreeBSD.org
Subject:   [Bug 271427] FreeBSD pw command injection vulnerability
Message-ID:  <bug-271427-99-qyvVzGWBdy@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-271427-99@https.bugs.freebsd.org/bugzilla/>
References:  <bug-271427-99@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D271427

--- Comment #3 from pbuff <858573819@qq.com> ---
(In reply to Baptiste Daroussin from comment #2)
Hello, this is a git-format patch:

diff --git a/pw_user.c b/pw_user.c
index 3d625a0..b16faaf 100644
--- a/pw_user.c
+++ b/pw_user.c
@@ -635,7 +635,7 @@ pw_checkname(char *name, int gecos)
                showtype =3D "gecos field";
        } else {
                /* See if the name is valid as a userid or group. */
-               badchars =3D " ,\t:+&#%$^()!@~*?<>=3D|\\/\"";
+               badchars =3D " ,\t:+&#%$^()!@~*?<>=3D|\\/\";";
                showtype =3D "userid/group name";
                /* Userids and groups can not have a leading '-'. */
                if (*ch =3D=3D '-')

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-271427-99-qyvVzGWBdy>