From 5b5ad21e78e5ae7d13a17451861e0b3742bba637 Mon Sep 17 00:00:00 2001 From: sheldonh Date: Mon, 25 Oct 1999 09:46:57 +0000 Subject: Do not rely on malloc() to zero-fill allocated memory, since it is not documented as doing so. This fixes a potential segmentation violation. PR: 14465 Reported by: Tony Finch --- usr.sbin/vipw/vipw.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) (limited to 'usr.sbin') diff --git a/usr.sbin/vipw/vipw.c b/usr.sbin/vipw/vipw.c index bf56eed..8986ab3 100644 --- a/usr.sbin/vipw/vipw.c +++ b/usr.sbin/vipw/vipw.c @@ -81,8 +81,9 @@ main(argc, argv) err(1, NULL); strcpy(masterpasswd, optarg); if (masterpasswd[strlen(masterpasswd) - 1] != '/') - masterpasswd[strlen(masterpasswd)] = '/'; - strcat(masterpasswd, _MASTERPASSWD); + strcat(masterpasswd, "/" _MASTERPASSWD); + else + strcat(masterpasswd, _MASTERPASSWD); if ((mppath = strdup(optarg)) == NULL) err(1, NULL); if (mppath[strlen(mppath) - 1] == '/') -- cgit v1.1