[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#588831: marked as done (lintian: please add permission check for /etc/sudoers.d/*)



Your message dated Mon, 12 Jul 2010 20:24:29 +0200
with message-id <20100712182429.GT27048@foghorn.stateful.de>
and subject line Re: lintian: please add permission check for /etc/sudoers.d/*
has caused the Debian Bug report #588831,
regarding lintian: please add permission check for /etc/sudoers.d/*
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
588831: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=588831
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: lintian
Severity: wishlist

| ... : /etc/sudoers.d/aegir is mode 0600, should be 0440 ; ...

Could you please add a check for this?  Nowadays many people exclusively
use sudo to get privileges and thus breaking sudo (e.g., #576527) by an
unrelated package is really bad, but it is also easily detectable.

sudo has an lintian overwrite for /etc/sudoers.d/README's permissions
(non-standard-file-perm), I guess you need to touch two things in
lintian to a) add above mentioned check and b) exclude /etc/sudoers.d/*
from non-standard-file-perm.


Regards
Carsten



--- End Message ---
--- Begin Message ---
|      } elsif ($operm == 0440 and $file =~ | m,etc/sudoers.d/,) {

Looks like you fixed the bug before I reported it and the false negative
was caused by generating /etc/sudoers.d/whatever in postinst.  Closing.


Carsten


--- End Message ---

Reply to: