[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#891813: marked as done (RFS: i2pd/2.18.0-1)



Your message dated Sat, 3 Mar 2018 20:38:22 +0100
with message-id <20180303193822.yxnstvf42fyva3pp@angband.pl>
and subject line Re: Bug#891813: RFS: i2pd/2.18.0-1 [ITP]
has caused the Debian Bug report #891813,
regarding RFS: i2pd/2.18.0-1
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
891813: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891813
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: sponsorship-requests
Severity: normal

Dear mentors,

I am looking for a sponsor for my package "i2pd"

 * Package name    : i2pd
   Version         : 2.18.0-1
   Upstream Author : R4SAS
 * URL             : https://github.com/PurpleI2P/i2pd
 * License         : BSD
   Section         : net


  It builds those binary packages:

    i2pd  - Full-featured C++ implementation of I2P client

  To access further information about this package, please visit the
following URL:

  https://mentors.debian.net/package/i2pd


  Alternatively, one can download the package with dget using this command:

    dget -x https://mentors.debian.net/debian/pool/main/i/i2pd/i2pd_2.18.0-1.dsc

  Git repo:

    https://salsa.debian.org/yangfl-guest/i2pd

Regards,
Yangfl

--- End Message ---
--- Begin Message ---
On Thu, Mar 01, 2018 at 12:43:39PM +0800, Yangfl wrote:
>  * Package name    : i2pd
>    Version         : 2.18.0-1

Uploaded.  Not tested on hurd.

There's a minor security issue, that you'd want to fix in a subsequent
upload: if someone manages to execute code as this daemon, and the system
runs without fs.protected_hardlinks=1 (default on Debian kernels but not on
vanilla), the next time postinst runs (usually on upgrades) the attacker can
gain ownership of any file, and thus escalate to root.  Lintian detects this
and reports as maintainer-script-should-not-use-recursive-chown-or-chmod.


喵!
-- 
⢀⣴⠾⠻⢶⣦⠀ 
⣾⠁⢠⠒⠀⣿⡁ A dumb species has no way to open a tuna can.
⢿⡄⠘⠷⠚⠋⠀ A smart species invents a can opener.
⠈⠳⣄⠀⠀⠀⠀ A master species delegates.

--- End Message ---

Reply to: