Your message dated Sat, 21 Mar 2009 23:02:02 +0000
with message-id <[email protected]>
and subject line Bug#520654: fixed in checksecurity 2.0.12
has caused the Debian Bug report #520654,
regarding checksecurity: check-sockets always prints an empty list
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
520654: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520654
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: checksecurity
Version: 2.0.11
Severity: normal
Tags: patch

The plugin check-sockets does not print anything useful, always
gives an empty list of sockets.
For me, the following modification fixes the issue:

--- checksecurity_2.0.11_all.deb/usr/share/checksecurity/check-sockets 
2008-07-28 00:00:00.000000000 +0200
+++ /usr/share/checksecurity/check-sockets      2009-03-21 17:50:34.000000000 
+0100
@@ -75,7 +75,7 @@
 
 # TODO: (jfs) Enhance using netstat if lsof is not available.
 # use the code @Tiger to do this.
-/usr/bin/lsof -i -n -P | egrep 'UDP|TCP.*LISTEN' | egrep -v 'UDP.*->.*' |sed 
's/....[0-9]u  IP.*     /   /' | sed 's/  FD   TYPE DEVICE SIZE NODE NAME/PROTO 
PORT/' | sed 's/ [0-9][0-9]* / /'|sed 's/ PID / /'| sed -e 's/[ \t]\+/ /g' | 
sort -u |  >>$TMPSOCKET
+/usr/bin/lsof -i -n -P | egrep 'UDP|TCP.*LISTEN' | egrep -v 'UDP.*->.*' |sed 
's/....[0-9]u  IP.*     /   /' | sed 's/  FD   TYPE DEVICE SIZE NODE NAME/PROTO 
PORT/' | sed 's/ [0-9][0-9]* / /'|sed 's/ PID / /'| sed -e 's/[ \t]\+/ /g' | 
sort -u  >>$TMPSOCKET
 set +o noglob
 
 if cmp -s sockets.today $TMPSOCKET >/dev/null



-- System Information:
Debian Release: 5.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-xen-amd64 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

Versions of packages checksecurity depends on:
ii  cron                          3.0pl1-105 management of regular background p
ii  debconf [debconf-2.0]         1.5.24     Debian configuration management sy
ii  perl                          5.10.0-19  Larry Wall's Practical Extraction 

Versions of packages checksecurity recommends:
ii  logcheck                      1.2.69     mails anomalies in the system logf
pn  tiger                         <none>     (no description available)
pn  tripwire | integrit | aide |  <none>     (no description available)

Versions of packages checksecurity suggests:
pn  apt-watch | cron-apt          <none>     (no description available)
ii  lockfile-progs                0.1.11-0.1 Programs for locking and unlocking

-- debconf information:
  checksecurity/oldconf:



--- End Message ---
--- Begin Message ---
Source: checksecurity
Source-Version: 2.0.12

We believe that the bug you reported is fixed in the latest version of
checksecurity, which is due to be installed in the Debian FTP archive:

checksecurity_2.0.12.dsc
  to pool/main/c/checksecurity/checksecurity_2.0.12.dsc
checksecurity_2.0.12.tar.gz
  to pool/main/c/checksecurity/checksecurity_2.0.12.tar.gz
checksecurity_2.0.12_all.deb
  to pool/main/c/checksecurity/checksecurity_2.0.12_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Javier Fernandez-Sanguino Pen~a <[email protected]> (supplier of updated 
checksecurity package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sat, 21 Mar 2009 23:46:07 +0100
Source: checksecurity
Binary: checksecurity
Architecture: source all
Version: 2.0.12
Distribution: unstable
Urgency: medium
Maintainer: Javier Fernandez-Sanguino Pen~a <[email protected]>
Changed-By: Javier Fernandez-Sanguino Pen~a <[email protected]>
Description: 
 checksecurity - basic system security checks
Closes: 520654
Changes: 
 checksecurity (2.0.12) unstable; urgency=medium
 .
   * Fix bug in plugins/check_sockets which prevented it from being
     actually useful. Thanks to Richard Kapolnai for detecting this
     bug and providing a patch. (Closes: #520654)
Checksums-Sha1: 
 25cfe8753306bbb96693a01456241f92940aff0a 746 checksecurity_2.0.12.dsc
 04c5c4f209c873d8d86ac857360308a2f6dbbfcd 27870 checksecurity_2.0.12.tar.gz
 4620cf2597cc8b4d7b9efaba80c039ac9363d5d3 24828 checksecurity_2.0.12_all.deb
Checksums-Sha256: 
 1da881802e2afb71c04a7fd5c49bc83d4068da81220d7d74f734da19a0d71358 746 
checksecurity_2.0.12.dsc
 a965a5f1f4f212a896cf7dded61fc2b66870685984965087273f1b3feea27ca9 27870 
checksecurity_2.0.12.tar.gz
 8978f6fccf9245a37f134f4038b007a434ce16d0af77441d0290306ee3cbfaa3 24828 
checksecurity_2.0.12_all.deb
Files: 
 dd6632c3445603eb68fa77f384c2815b 746 admin optional checksecurity_2.0.12.dsc
 6b8e92afb5ed9db6756d6f7484ddd009 27870 admin optional 
checksecurity_2.0.12.tar.gz
 1bc30056e43fe1f109dfe14127754bb5 24828 admin optional 
checksecurity_2.0.12_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFJxW5+sandgtyBSwkRAqzVAJ9wWYZpRT0Ghd0yifKuAGJsR+aVKgCfUO9q
DI+w0uZp+CwR5yQp9KLLPzo=
=lzoy
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to