Bug#511688: [Pkg-clamav-devel] Bug#511688: /etc/init.d/clamav-milter stop doesn't stop the clamav-milter daemon

2009-01-13 Thread Bruno Treguier

On 01/13/2009 10:34 PM, Michael Tautschnig wrote:


I just downloaded a fresh .deb from the Debian servers and its definitely not
screwed up in there. The bug reporter did not provide a Version: pseudo-header,
bug juding from reportbug's info he's using testing aka lenny, and that is
0.94.dfsg.2-1, which I just checked.

We do have the code without the above line in etch(-security), but not in any of
the later versions...


Hello guys,

It seems I've something screwed up here in my installation, sorry about 
that. I just downloaded a fresh binary and a fresh source package again, 
and everything is fine, the untainting line just above the kill -15 
is there... Don't know what happened here, looks like I still have an 
old init script hanging around as Stephen suggested...


My fault... Sorry again for the fuss. This bug can of course be 
closed, and I'm going to hang myself, or get drowned somewhere, argh. :-)


Best regards,

Bruno



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#388473: nagios2-common: Nagios2 double log rotation

2006-09-20 Thread Bruno Treguier
Package: nagios2-common
Severity: normal

Hello,

The package nagios2-common provides a log rotation scheme for
nagios2 in the file /etc/logrotate.d/nagios2-common, which breaks
nagios2's own log rotation mechanism (nagios2 relies on a daily or even
hourly log rotation, and has its own naming scheme on which certain
functionalities depend, as the alert history or the availability
reports).

This file thus should not be included in the package at all, as
logrotate shouldn't touch nagios2's logs.

Regards,

Bruno

-- System Information:
Debian Release: testing/unstable
  APT prefers testing-proposed-updates
  APT policy: (500, 'testing-proposed-updates'), (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15.6
Locale: LANG=C, LC_CTYPE=fr_FR (charmap=ISO-8859-1)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#380078: Precisions

2006-07-28 Thread Bruno Treguier
In my previous message, I was saying:

 Since version 246, a change has been made to libnss_ldap, whose
 functions getspnam() and getspnam_r() now return * instead
 of x previously, in the sp_pwdp member of a spwd struct.

Of course, this only happens in the case /etc/shadow cannot be read,
and thus the password cannot be retrieved, which is the case for most
users.

Best regards.

-- 
-- Service Hydrographique et Oceanographique de la Marine ---  EPSHOM/CIS/MIC
-- 13, rue du Chatellier ---  BP 30316  --- 29603 Brest Cedex, FRANCE
--Phone: +33 2 98 22 17 49  ---  Email: [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#380078: libpam-modules: pam_unix fails to call helper unix_pwdchk when used with libnss_ldap 246

2006-07-27 Thread Bruno Treguier
Package: libpam-modules
Version: 0.79-3.1
Severity: important
Tags: patch


Since version 246, a change has been made to libnss_ldap, whose
functions getspnam() and getspnam_r() now return * instead
of x previously, in the sp_pwdp member of a spwd struct.

This introduces an incompatibility with the present version of
libpam-modules, as the * case is not handled by the code in
support.c (line 741), thus resulting in the helper program
unix_chkpwd never being called.

As a consequence, all the programs relying on libpam-modules to
authenticate a user in an LDAP environment may fail. kcheckpass is an
example of such a program.

Proposed patch:

$ diff -u support.c support.c.new
--- support.c   2006-07-27 13:17:04.0 +0200
+++ support.c.new   2006-07-27 13:17:39.0 +0200
@@ -738,7 +738,7 @@
}

retval = PAM_SUCCESS;
-   if (pwd == NULL || salt == NULL || !strcmp(salt, x) || ((salt[0] == 
'#')  (salt[1] == '#')  !strcmp(salt + 2, name))) {
+   if (pwd == NULL || salt == NULL || !strcmp(salt, x) || !strcmp(salt, 
*) || ((salt[0] == '#')  (salt[1] == '#')  !strcmp(salt + 2, name))) {

if (geteuid() || SELINUX_ENABLED) {
/* we are not root perhaps this is the reason?  * Run 
helper */



-- System Information:
Debian Release: testing/unstable
  APT prefers testing-proposed-updates
  APT policy: (500, 'testing-proposed-updates'), (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15.6
Locale: LANG=C, LC_CTYPE=fr_FR (charmap=ISO-8859-1)

Versions of packages libpam-modules depends on:
ii  libc6 2.3.6-15   GNU C Library: Shared libraries
ii  libcap1   1:1.10-14  support for getting/setting POSIX.
ii  libdb4.3  4.3.29-4.1 Berkeley v4.3 Database Libraries [
ii  libpam0g  0.79-3.1   Pluggable Authentication Modules l
ii  libselinux1   1.30-1 SELinux shared libraries

libpam-modules recommends no packages.

-- no debconf information

-- 
-- Service Hydrographique et Oceanographique de la Marine ---  EPSHOM/CIS/MIC
-- 13, rue du Chatellier ---  BP 30316  --- 29603 Brest Cedex, FRANCE
--Phone: +33 2 98 22 17 49  ---  Email: [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]