Your message dated Tue, 16 Mar 2010 00:39:04 +0000
with message-id <[email protected]>
and subject line Bug#573902: fixed in socat 1.7.1.2-3
has caused the Debian Bug report #573902,
regarding socat truncates UNIX-LISTEN socket path
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
573902: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=573902
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: socat
Version: 1.7.1.2-2
Severity: normal
When specifying a UNIX-LISTEN socket path, socat truncates the path.
The OS is capable of a longer path. If possible, could socat respect the
path lenght available to the operating system? If not - I think a longer
limit than the one available would be great. (256 characters?).
Below is a terminate session demonstrating the problem.
Thanks,
jamie
0 ja...@chicken:~$ ls /tmp/01*
ls: cannot access /tmp/01*: No such file or directory
2 ja...@chicken:~$ socat STDIO
UNIX-LISTEN:/tmp/0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
&
[1] 8283
0 ja...@chicken:~$ ls /tmp/01*
/tmp/0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456
0 ja...@chicken:~$ ls /tmp/01* | wc -c
109
0 ja...@chicken:~$ touch
/tmp/0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
0 ja...@chicken:~$ ls /tmp/01*
/tmp/0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456
/tmp/0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
0 ja...@chicken:~$
-- System Information:
Debian Release: squeeze/sid
APT prefers testing
APT policy: (500, 'testing'), (200, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.32-trunk-vserver-amd64 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages socat depends on:
ii libc6 2.10.2-6 Embedded GNU C Library: Shared lib
ii libreadline6 6.1-1 GNU readline and history libraries
ii libssl0.9.8 0.9.8k-8 SSL shared libraries
ii libwrap0 7.6.q-18 Wietse Venema's TCP wrappers libra
socat recommends no packages.
socat suggests no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: socat
Source-Version: 1.7.1.2-3
We believe that the bug you reported is fixed in the latest version of
socat, which is due to be installed in the Debian FTP archive:
socat_1.7.1.2-3.debian.tar.gz
to main/s/socat/socat_1.7.1.2-3.debian.tar.gz
socat_1.7.1.2-3.dsc
to main/s/socat/socat_1.7.1.2-3.dsc
socat_1.7.1.2-3_amd64.deb
to main/s/socat/socat_1.7.1.2-3_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Chris Taylor <[email protected]> (supplier of updated socat package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Mon, 15 Mar 2010 23:29:08 +0000
Source: socat
Binary: socat
Architecture: source amd64
Version: 1.7.1.2-3
Distribution: unstable
Urgency: low
Maintainer: Chris Taylor <[email protected]>
Changed-By: Chris Taylor <[email protected]>
Description:
socat - multipurpose relay for bidirectional data transfer
Closes: 572392 573902
Changes:
socat (1.7.1.2-3) unstable; urgency=low
.
* Patch manpage in 02-Manpage-slashes.
- Removes spurious slashes (Closes: #572392).
* Fix socat truncation in 03-Truncate (Closes: #573902).
* Add README.Debian to explain handling of truncated sockets.
Checksums-Sha1:
10db3684ab839ef2582a4cd79bde58bd8212cb8a 1070 socat_1.7.1.2-3.dsc
3e472e66a129f35cb18f2c3452d0ff2374178306 11494 socat_1.7.1.2-3.debian.tar.gz
c047aa375a859144d6c38b444630c86c017a36b1 379050 socat_1.7.1.2-3_amd64.deb
Checksums-Sha256:
7c4c9e211f8a170df32200da67763eb48ade24a23543bbf1fc34e7a63767455d 1070
socat_1.7.1.2-3.dsc
616589bdc917899fdea6bc4be7987bfa671fccfd806ec0968130ddaaefa02e5d 11494
socat_1.7.1.2-3.debian.tar.gz
f8f5187c1d408c8da1867b668a794bec204cc5fb3b60e18a06a64c9e3e116582 379050
socat_1.7.1.2-3_amd64.deb
Files:
0ba6883b806f4259573e12367cbef3c4 1070 net extra socat_1.7.1.2-3.dsc
e7f0ddbd389d88af653bcd1d976ad700 11494 net extra socat_1.7.1.2-3.debian.tar.gz
7c9ecdb85de98927e03576cd0b33fa03 379050 net extra socat_1.7.1.2-3_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkueznYACgkQLpNUoan9SCFqcACfXroZCE2nC/KA6iMP+BSRxsVA
AVAAnA8fNaiBOBMk6THHCaQfZ2gzk7xT
=k1ep
-----END PGP SIGNATURE-----
--- End Message ---