Giuseppe Iuculano <giuse...@iuculano.it> writes: > Yes, it should be. Could you compile the attacked chkutmp.c file please? > gcc -o chkutmp-new chkutmp.c
Didn't help, but I put together an alternative patch, and would appreciate it if you could apply it (and pass it upstream): --- chkutmp.c~ 2009-08-22 18:00:20.000000000 -0400 +++ chkutmp.c 2009-08-22 18:14:11.000000000 -0400 @@ -113,6 +113,8 @@ s++; for (x = 0; (*d++ = *s++) && x <= MAXLENGTH; x++) /* cmd + args */ ; + if (d[-2] == '\n') + d[-2] = '\0'; i++; curp++; } @@ -202,7 +204,7 @@ "CMD"); hdr_prntd = 1; } - printf("! %-9s %7d %-6s %s", ps_l[h].ps_user, + printf("! %-9s %7d %-6s %s\n", ps_l[h].ps_user, ps_l[h].ps_pid, ps_l[h].ps_tty, ps_l[h].ps_args); } } Thanks! -- Aaron M. Ucko, KB1CJC (amu at alum.mit.edu, ucko at debian.org) Finger a...@monk.mit.edu (NOT a valid e-mail address) for more info. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org