[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#325824: marked as done (ITP: ninja -- privilege escalation detection system for GNU\Linux)



Your message dated Sun, 29 Jul 2007 18:14:08 +0000
with message-id <E1IFDHM-0000gJ-Kd@ries.debian.org>
and subject line Bug#325824: fixed in ninja 0.1.2-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: William Vera <billy@billy.com.mx>


* Package name    : ninja
  Version         : 0.1.1
  Upstream Author : Tom Rune Flo <tom@x86.no>
* URL             : http://forkbomb.org/ninja/
* License         : GPL
  Description     : Privilege escalation detection system for GNU\Linux

Ninja is a privilege escalation detection  and  prevention
system for GNU/Linux hosts. While running, it will monitor
process activity on the local host, and keep track of  all
processes  running  as root.  If a process is spawned with
UID or GID zero (root), ninja will log necessary  informa-
tion  about  this process, and optionally kill the process
if it was spawned by an unauthorized user.

A "magic" group can be specified, allowing members of this
group to run any setuid/setgid root executable.

Individual  executables  can be whitelisted.  Ninja uses a
fine grained whitelist that lets you whitelist executables
on  a  group  and/or user basis. This can be used to allow
specific groups or individual users access to  setuid/set-
gid root programs, such as su(1) and passwd(1).


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.8-2-386
Locale: LANG=es_MX, LC_CTYPE=es_MX (charmap=ISO-8859-1)


--- End Message ---
--- Begin Message ---
Source: ninja
Source-Version: 0.1.2-1

We believe that the bug you reported is fixed in the latest version of
ninja, which is due to be installed in the Debian FTP archive:

ninja_0.1.2-1.diff.gz
  to pool/main/n/ninja/ninja_0.1.2-1.diff.gz
ninja_0.1.2-1.dsc
  to pool/main/n/ninja/ninja_0.1.2-1.dsc
ninja_0.1.2-1_powerpc.deb
  to pool/main/n/ninja/ninja_0.1.2-1_powerpc.deb
ninja_0.1.2.orig.tar.gz
  to pool/main/n/ninja/ninja_0.1.2.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 325824@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
William Vera <billy@billy.com.mx> (supplier of updated ninja package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 04 Jul 2007 21:41:21 -0500
Source: ninja
Binary: ninja
Architecture: source powerpc
Version: 0.1.2-1
Distribution: unstable
Urgency: low
Maintainer: William Vera <billy@billy.com.mx>
Changed-By: William Vera <billy@billy.com.mx>
Description: 
 ninja      - Privilege escalation detection system for GNU\Linux
Closes: 325824
Changes: 
 ninja (0.1.2-1) unstable; urgency=low
 .
   * Initial release (Closes: #325824)
Files: 
 9e9950c15b44091898e1532e135ca226 568 admin optional ninja_0.1.2-1.dsc
 adb4493c29665ea3ad4878e823dfaa97 11748 admin optional ninja_0.1.2.orig.tar.gz
 1419415c61e32001de9750bd5e065095 1851 admin optional ninja_0.1.2-1.diff.gz
 85218b0589256a7d15127a59c97bb06d 16896 admin optional ninja_0.1.2-1_powerpc.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGrM9JmBxf18ZxJX0RAuJdAJ44AJePVNqVkDErk7WILZcqfdZYtwCdGwd8
5E0s0u6HOuLdZS1S/Ck2FTo=
=M6+b
-----END PGP SIGNATURE-----


--- End Message ---

Reply to: