Giuseppe Iuculano <giuse...@iuculano.it> writes:

> Yes, it should be. Could you compile the attacked chkutmp.c file please?
> gcc -o chkutmp-new chkutmp.c

Didn't help, but I put together an alternative patch, and would
appreciate it if you could apply it (and pass it upstream):

--- chkutmp.c~  2009-08-22 18:00:20.000000000 -0400
+++ chkutmp.c   2009-08-22 18:14:11.000000000 -0400
@@ -113,6 +113,8 @@
                    s++;
                for (x = 0; (*d++ = *s++) && x <= MAXLENGTH; x++)       /* cmd 
+ args */
                    ;
+               if (d[-2] == '\n')
+                   d[-2] = '\0';
                i++;
                curp++;
            }
@@ -202,7 +204,7 @@
                       "CMD");
                hdr_prntd = 1;
            }
-           printf("! %-9s %7d %-6s %s", ps_l[h].ps_user,
+           printf("! %-9s %7d %-6s %s\n", ps_l[h].ps_user,
                   ps_l[h].ps_pid, ps_l[h].ps_tty, ps_l[h].ps_args);
        }
     }

Thanks!

-- 
Aaron M. Ucko, KB1CJC (amu at alum.mit.edu, ucko at debian.org)
Finger a...@monk.mit.edu (NOT a valid e-mail address) for more info.



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to