...
 
Commits (1)
cracklib2 (2.8.19-3) unstable; urgency=low
* update debian/patches/libcrack2-error-safer-check-variant.patch with
fixed version from http://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=689588#29
-- Jan Dittberner <jandd@debian.org> Wed, 12 Dec 2012 22:56:46 +0100
cracklib2 (2.8.19-2) unstable; urgency=low
* add debian/patches/libcrack2-error-safer-check-variant.patch to provide
......
......@@ -13,7 +13,7 @@ Bug-Debian: http://bugs.debian.org/682735
+__DEBIAN_SPECIFIC__SafeFascistCheck(password, path, errstr)
+ const char *password;
+ const char *path;
+ char *errstr;
+ char **errstr;
+{
+ PWDICT *pwp;
+ char pwtrunced[STRINGSIZE];
......@@ -41,7 +41,7 @@ Bug-Debian: http://bugs.debian.org/682735
+ }
+
+ /* sure seems like we should close the database, since we're only likely to check one password */
+ errstr = FascistLook(pwp, pwtrunced);
+ *errstr = FascistLook(pwp, pwtrunced);
+
+ PWClose(pwp);
+ pwp = (PWDICT *)0;
......@@ -78,7 +78,7 @@ Bug-Debian: http://bugs.debian.org/682735
LOCK();
- result = FascistCheck(candidate, dict ? dict : defaultdict);
+ result = __DEBIAN_SPECIFIC__SafeFascistCheck(candidate,
+ dict ? dict : defaultdict, errmsg);
+ dict ? dict : defaultdict, &errmsg);
UNLOCK();
if (defaultdict != NULL)
......@@ -124,7 +124,7 @@ Bug-Debian: http://bugs.debian.org/682735
+ opening or reading the dictionary. In the later case, please check
+ errno. */
+extern int __DEBIAN_SPECIFIC__SafeFascistCheck(const char *pw,
+ const char *dictpath, char *errmsg);
+ const char *dictpath, char **errmsg);
+
/* This function returns the compiled in value for DEFAULT_CRACKLIB_DICT.
*/
......