Bug#511688: [Pkg-clamav-devel] Bug#511688: /etc/init.d/clamav-milter stop doesn't stop the clamav-milter daemon
On 01/13/2009 10:34 PM, Michael Tautschnig wrote: I just downloaded a fresh .deb from the Debian servers and its definitely not screwed up in there. The bug reporter did not provide a Version: pseudo-header, bug juding from reportbug's info he's using testing aka lenny, and that is 0.94.dfsg.2-1, which I just checked. We do have the code without the above line in etch(-security), but not in any of the later versions... Hello guys, It seems I've something screwed up here in my installation, sorry about that. I just downloaded a fresh binary and a fresh source package again, and everything is fine, the untainting line just above the kill -15 is there... Don't know what happened here, looks like I still have an old init script hanging around as Stephen suggested... My fault... Sorry again for the fuss. This bug can of course be closed, and I'm going to hang myself, or get drowned somewhere, argh. :-) Best regards, Bruno -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Bug#388473: nagios2-common: Nagios2 double log rotation
Package: nagios2-common Severity: normal Hello, The package nagios2-common provides a log rotation scheme for nagios2 in the file /etc/logrotate.d/nagios2-common, which breaks nagios2's own log rotation mechanism (nagios2 relies on a daily or even hourly log rotation, and has its own naming scheme on which certain functionalities depend, as the alert history or the availability reports). This file thus should not be included in the package at all, as logrotate shouldn't touch nagios2's logs. Regards, Bruno -- System Information: Debian Release: testing/unstable APT prefers testing-proposed-updates APT policy: (500, 'testing-proposed-updates'), (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15.6 Locale: LANG=C, LC_CTYPE=fr_FR (charmap=ISO-8859-1) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#380078: Precisions
In my previous message, I was saying: Since version 246, a change has been made to libnss_ldap, whose functions getspnam() and getspnam_r() now return * instead of x previously, in the sp_pwdp member of a spwd struct. Of course, this only happens in the case /etc/shadow cannot be read, and thus the password cannot be retrieved, which is the case for most users. Best regards. -- -- Service Hydrographique et Oceanographique de la Marine --- EPSHOM/CIS/MIC -- 13, rue du Chatellier --- BP 30316 --- 29603 Brest Cedex, FRANCE --Phone: +33 2 98 22 17 49 --- Email: [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#380078: libpam-modules: pam_unix fails to call helper unix_pwdchk when used with libnss_ldap 246
Package: libpam-modules Version: 0.79-3.1 Severity: important Tags: patch Since version 246, a change has been made to libnss_ldap, whose functions getspnam() and getspnam_r() now return * instead of x previously, in the sp_pwdp member of a spwd struct. This introduces an incompatibility with the present version of libpam-modules, as the * case is not handled by the code in support.c (line 741), thus resulting in the helper program unix_chkpwd never being called. As a consequence, all the programs relying on libpam-modules to authenticate a user in an LDAP environment may fail. kcheckpass is an example of such a program. Proposed patch: $ diff -u support.c support.c.new --- support.c 2006-07-27 13:17:04.0 +0200 +++ support.c.new 2006-07-27 13:17:39.0 +0200 @@ -738,7 +738,7 @@ } retval = PAM_SUCCESS; - if (pwd == NULL || salt == NULL || !strcmp(salt, x) || ((salt[0] == '#') (salt[1] == '#') !strcmp(salt + 2, name))) { + if (pwd == NULL || salt == NULL || !strcmp(salt, x) || !strcmp(salt, *) || ((salt[0] == '#') (salt[1] == '#') !strcmp(salt + 2, name))) { if (geteuid() || SELINUX_ENABLED) { /* we are not root perhaps this is the reason? * Run helper */ -- System Information: Debian Release: testing/unstable APT prefers testing-proposed-updates APT policy: (500, 'testing-proposed-updates'), (500, 'testing') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.15.6 Locale: LANG=C, LC_CTYPE=fr_FR (charmap=ISO-8859-1) Versions of packages libpam-modules depends on: ii libc6 2.3.6-15 GNU C Library: Shared libraries ii libcap1 1:1.10-14 support for getting/setting POSIX. ii libdb4.3 4.3.29-4.1 Berkeley v4.3 Database Libraries [ ii libpam0g 0.79-3.1 Pluggable Authentication Modules l ii libselinux1 1.30-1 SELinux shared libraries libpam-modules recommends no packages. -- no debconf information -- -- Service Hydrographique et Oceanographique de la Marine --- EPSHOM/CIS/MIC -- 13, rue du Chatellier --- BP 30316 --- 29603 Brest Cedex, FRANCE --Phone: +33 2 98 22 17 49 --- Email: [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]