[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#529569: marked as done (clamfs: access to large files denied)



Your message dated Thu, 14 Nov 2019 08:45:55 +0000
with message-id <E1iVAlH-0008IX-Si@fasolo.debian.org>
and subject line Bug#529569: fixed in clamfs 1.1.0-1
has caused the Debian Bug report #529569,
regarding clamfs: access to large files denied
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
529569: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529569
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: clamfs
Version: 1.0.0-1
Severity: normal


In a clamfs protect filesystem I have a file bigger then 2GB:

-rw-r-xr-- 1 www-data www-data 2663258112 2009-05-20 08:12 cdimage.iso

When I'm trying to read-access the file, I'm not allowed too:

unki@srv-vie-ftp01:...$ head cdimage.iso 
head: cannot open `cdimage.iso' for reading: Operation not permitted



clamd is configured to the default MaxFileSize of 25MB. According to the manpage "Files larger than this limit won’t be scanned.".  Anyway, in clamav.log I can find entries (one liners) like:

Wed May 20 08:54:07 2009 -> WARNING: lstat() failed on: .../cdimage.iso

When I straced clamd at this time I can see:

[pid 18294]
lstat64("/var/lib/nephthys/transfer.unprotected/63e11bdd141239dcdc11dbe419cbbf4fc9e8dfab/cdimage.iso",
{st_mode=S_IFREG|0654, st_size=2663258112, ...}) = 0
[pid 18294] send(9, "", 0, 0)           = 0
[pid 18294] send(9, "/var/lib/nephthys/transfer.unpro"..., 154, 0) = 154
[pid 18294] time([1242802662])          = 1242802662
[pid 18294] write(3, "Wed May 20 08:57:42 2009 -> WARN"..., 148) = 148
[pid 18294] write(2, "WARNING: lstat() failed on: /var"..., 120) = 120
[pid 18294] shutdown(9, 2 /* send and receive */) = 0

stracing clamfs shows the following:

[pid 19089] send(4, "SCAN /var/lib/nephthys/transfer.unprotected/63e11bdd141239dcdc11dbe419cbbf4fc9e8dfab/cdimage.iso\n", 97, 0) = 97
[pid 19089] recv(4, "/var/lib/nephthys/transfer.unprotected/63e11bdd141239dcdc11dbe419cbbf4fc9e8dfab/cdimage.iso: lstat() failed: Value too large for"..., 512, 0) = 154

As you can see, clamfs sends the SCAN request to clamd. Clamd responds that the file is too large and it won't scan it. And now it seems that clamfs interprets this wrong and refuses access to this file.


Regards,
Andreas


-- System Information:
Debian Release: 4.0
  APT prefers oldstable
  APT policy: (500, 'oldstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.24-etchnhalf.1-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages clamfs depends on:
ii  libc6               2.3.6.ds1-13etch9+b1 GNU C Library: Shared libraries
ii  libcommoncpp2-1.5-0 1.5.1-4              A GNU package for creating portabl
ii  libfuse2            2.5.3-4.4            Filesystem in USErspace library
ii  libgcc1             1:4.1.1-21           GCC support library
ii  libgcrypt11         1.2.3-2              LGPL Crypto library - runtime libr
ii  libgnutls13         1.4.4-3+etch4        the GNU TLS library - runtime libr
ii  libpocofoundation5  1.3.2+dfsg1-4~mm.1   The C++ Portable Components Founda
ii  libpoconet5         1.3.2+dfsg1-4~mm.1   The C++ Portable Components Networ
ii  librlog1c2a         1.3.7-1              flexible message logging library
ii  libstdc++6          4.1.1-21             The GNU Standard C++ Library v3
ii  zlib1g              1:1.2.3-13           compression library - runtime

Versions of packages clamfs recommends:
pn  clamav-daemon                 <none>     (no description available)

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: clamfs
Source-Version: 1.1.0-1

We believe that the bug you reported is fixed in the latest version of
clamfs, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 529569@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Krzysztof Burghardt <krzysztof@burghardt.pl> (supplier of updated clamfs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 23 Oct 2019 21:29:23 +0200
Source: clamfs
Architecture: source
Version: 1.1.0-1
Distribution: unstable
Urgency: medium
Maintainer: Krzysztof Burghardt <krzysztof@burghardt.pl>
Changed-By: Krzysztof Burghardt <krzysztof@burghardt.pl>
Closes: 529569 678863 925653
Changes:
 clamfs (1.1.0-1) unstable; urgency=medium
 .
   * New upstream version (closes: #529569, #925653).
   * New maintainer (closes: #678863).
   * Format set to 3.0 (quilt).
   * Set debian/compat to 12.
   * Rewritten debian/copyright to be machine readable.
   * debian/control:
     - drop dependency on libcommoncpp2-dev
     - bumped Standards-Version to 4.4.1
     - updated Homepage
   * debian/rules:
     - removed white spaces from line endings
     - replaced dh_clean -k with dh_prep
     - add build-arch and build-indep targets
     - enabled hardening=+all
   * debian/watch:
     - switch to github
     - verify PGP signature
Checksums-Sha1:
 98b82e28404c810af1c1f96440df530e9a2b86e1 2017 clamfs_1.1.0-1.dsc
 22b88f56884f79f6cf10d2cd3f09abfaaa6f5482 181457 clamfs_1.1.0.orig.tar.gz
 aa35efc237eeecbc8d1dbc04b7e5c3ca0d93f725 488 clamfs_1.1.0.orig.tar.gz.asc
 efc9660632323ca1ca2ad4ef78cbb9cd01aa4ad5 7080 clamfs_1.1.0-1.debian.tar.xz
 60a43eaaa35a5d968c9a4d3a22777929f0f18815 5514 clamfs_1.1.0-1_source.buildinfo
Checksums-Sha256:
 c7d9479150b94bcfb5b333d629779c28bad094d1414c90d3f057fc2fcbf365a2 2017 clamfs_1.1.0-1.dsc
 64747d91af1c2a308c16a8fcfdae1ff8a43a72d600cae8397a93d9dc9c176ff2 181457 clamfs_1.1.0.orig.tar.gz
 493a4ccc34109b71064c8052d2fafa236908bf553b79ff901721771820665fc7 488 clamfs_1.1.0.orig.tar.gz.asc
 bf8af927c4555a8c882cb2fb3fc56ba50d14ea962e86f9164b60599efe5c2153 7080 clamfs_1.1.0-1.debian.tar.xz
 8ecc9bbd5c2751ac0ecb16a3a2e35e71a7848e01c06f1c53399b3531a9e81faf 5514 clamfs_1.1.0-1_source.buildinfo
Files:
 52360960f3e2e065a79ad5dd4a33a7bb 2017 utils optional clamfs_1.1.0-1.dsc
 52ebc7666b6adafac8cc0aceeb0490d1 181457 utils optional clamfs_1.1.0.orig.tar.gz
 9f534805dd9770f527eb30c800b632b5 488 utils optional clamfs_1.1.0.orig.tar.gz.asc
 de8dee76b275714a924065c43d29765b 7080 utils optional clamfs_1.1.0-1.debian.tar.xz
 ca326fcff8d5fe706508a63e1a70556b 5514 utils optional clamfs_1.1.0-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=rZRJ
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: