From 9696842a61b6608f10633a984732a145c4fe5c68 Mon Sep 17 00:00:00 2001 From: KatolaZ Date: Fri, 8 Feb 2019 05:14:29 +0000 Subject: add debian/ folder --- debian/patches/03-468454-fingerd-ipv6.patch | 33 +++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 debian/patches/03-468454-fingerd-ipv6.patch (limited to 'debian/patches/03-468454-fingerd-ipv6.patch') diff --git a/debian/patches/03-468454-fingerd-ipv6.patch b/debian/patches/03-468454-fingerd-ipv6.patch new file mode 100644 index 0000000..854643e --- /dev/null +++ b/debian/patches/03-468454-fingerd-ipv6.patch @@ -0,0 +1,33 @@ +http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=468454 + +Description: Implement IPv6 capacity for the server Fingerd. +Author: Mats Erik Andersson +Forwarded: no +Last-Update: 2010-02-09 + +--- a/fingerd/fingerd.c ++++ b/fingerd/fingerd.c +@@ -112,7 +112,7 @@ main(int argc, char *argv[]) + int k, nusers; + char *s, *t; + const char *fingerpath = NULL; +- struct sockaddr_in sn; ++ struct sockaddr_storage sn; + socklen_t sval = sizeof(sn); + + +@@ -182,11 +182,13 @@ main(int argc, char *argv[]) + } + + if (welcome) { +- char buf[256]; ++ char buf[256] = ""; + struct hostent *hp; + struct utsname utsname; + + uname(&utsname); ++ /* gethostbyname() only retrieves the local hostname. ++ * This does not disturb IPv6 in any manner. */ + gethostname(buf, sizeof(buf)); + if ((hp = gethostbyname(buf))) { + /* paranoia: dns spoofing? */ -- cgit v1.2.3