Date: Mon, 15 May 2023 07:09:09 +0000 From: bugzilla-noreply@freebsd.org To: standards@FreeBSD.org Subject: [Bug 271427] FreeBSD pw command injection vulnerability Message-ID: <bug-271427-99-qyvVzGWBdy@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-271427-99@https.bugs.freebsd.org/bugzilla/> References: <bug-271427-99@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D271427 --- Comment #3 from pbuff <858573819@qq.com> --- (In reply to Baptiste Daroussin from comment #2) Hello, this is a git-format patch: diff --git a/pw_user.c b/pw_user.c index 3d625a0..b16faaf 100644 --- a/pw_user.c +++ b/pw_user.c @@ -635,7 +635,7 @@ pw_checkname(char *name, int gecos) showtype =3D "gecos field"; } else { /* See if the name is valid as a userid or group. */ - badchars =3D " ,\t:+&#%$^()!@~*?<>=3D|\\/\""; + badchars =3D " ,\t:+&#%$^()!@~*?<>=3D|\\/\";"; showtype =3D "userid/group name"; /* Userids and groups can not have a leading '-'. */ if (*ch =3D=3D '-') --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-271427-99-qyvVzGWBdy>