Morita, nice work!  I was planning on doing the exact same thing after
I straced a running fcrackzip and saw what was going on.

However, I see one problem with your proposed patch.  You've left out
the check against unzip returning 1, which according to the comments
in the original code, should be taken to be a successful return as well
as zero.


Related bug report: fcrackzip --use-unzip will fail to run on filenames
that contain a space.  The unzip child process will receive only up to
the first space, presumably fail to find that file, and exit with failure.
Thus, fcrackzip will never confirm the password even when it stumbles upon
the correct one.


Francesco, Morita's patch will solve the space intolerance, the single-
quote intolerance, and the possible security hole mentioned in this
thread all in one shot.  May I suggest pushing this patch upstream after
putting back in the check for unzip returning 1 (which, is missing, is
solidly arguable grounds for upstream rejecting it)?

Thanks much!


                            ------Carl



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to