[Pkg-sysvinit-devel] Bug#349578: marked as done (mesg complains about wrong permissions off tty)

Debian Bug Tracking System owner at bugs.debian.org
Wed Jan 25 14:03:19 UTC 2006

Your message dated Wed, 25 Jan 2006 05:47:06 -0800
with message-id <E1F1kzK-0008MI-OW at spohr.debian.org>
and subject line Bug#349578: fixed in debsecan 0.4.1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

Received: (at submit) by bugs.debian.org; 23 Jan 2006 20:50:58 +0000
>From Klaus at Ethgen.de Mon Jan 23 12:50:58 2006
Return-path: <Klaus at Ethgen.de>
Received: from static-195-068.catv.glattnet.ch ([] helo=ikki.ethgen.de)
	by spohr.debian.org with esmtp (Exim 4.50)
	id 1F18eQ-0005az-5X
	for submit at bugs.debian.org; Mon, 23 Jan 2006 12:50:58 -0800
Received: from klaus by ikki.ethgen.de with local (Exim 4.60)
	(envelope-from <klaus at ethgen.de>)
	id 1F18co-0003Ck-3D; Mon, 23 Jan 2006 21:49:18 +0100
Date: Mon, 23 Jan 2006 21:49:18 +0100
From: Klaus Ethgen <Klaus at Ethgen.de>
To: Debian Bug Tracking System <submit at bugs.debian.org>
Subject: mesg complains about wrong permissions off tty
Message-ID: <20060123204918.GA12215 at ikki>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; x-action=pgp-signed
Content-Disposition: inline
X-Reportbug-Version: 3.18
User-Agent: Mutt/1.5.11
Delivered-To: submit at bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02

Hash: SHA1

Package: sysvinit
Version: 2.86.ds1-6
Severity: minor

Since the last upgrade I made, mesg complains:
mesg: error: tty device is not owned by group `tty'

The tty is /dev/pts/* and is allways owned and group owned by me. So the
compliens do so cause the security is to high.

- -- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (800, 'unstable'), (700, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.4.32
Locale: LANG=de_DE, LC_CTYPE=de_DE (charmap=ISO-8859-1) (ignored: LC_ALL set to de_DE)

Versions of packages sysvinit depends on:
ii  coreutils                     5.93-5     The GNU core utilities
ii  initscripts                   2.86.ds1-6 Standard scripts needed for bootin
ii  libc6                         2.3.5-12   GNU C Library: Shared libraries an
ii  libselinux1                   1.28-2     SELinux shared libraries
ii  libsepol1                     1.10-1     Security Enhanced Linux policy lib
ii  sysv-rc                       2.86.ds1-6 Standard boot mechanism using syml

sysvinit recommends no packages.

- -- no debconf information

- -- 
Klaus Ethgen                            http://www.ethgen.de/
pub  2048R/D1A4EDE5 2000-02-26 Klaus Ethgen <Klaus at Ethgen.de>
Fingerprint: D7 67 71 C4 99 A6 D4 FE  EA 40 30 57 3C 88 26 2B
Version: GnuPG v1.4.2 (GNU/Linux)


Received: (at 349578-close) by bugs.debian.org; 25 Jan 2006 13:50:28 +0000
>From katie at ftp-master.debian.org Wed Jan 25 05:50:28 2006
Return-path: <katie at ftp-master.debian.org>
Received: from katie by spohr.debian.org with local (Exim 4.50)
	id 1F1kzK-0008MI-OW; Wed, 25 Jan 2006 05:47:06 -0800
From: Florian Weimer <fw at deneb.enyo.de>
To: 349578-close at bugs.debian.org
X-Katie: $Revision: 1.65 $
Subject: Bug#349578: fixed in debsecan 0.4.1
Message-Id: <E1F1kzK-0008MI-OW at spohr.debian.org>
Sender: Archive Administrator <katie at ftp-master.debian.org>
Date: Wed, 25 Jan 2006 05:47:06 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: debsecan
Source-Version: 0.4.1

We believe that the bug you reported is fixed in the latest version of
debsecan, which is due to be installed in the Debian FTP archive:

  to pool/main/d/debsecan/debsecan_0.4.1.dsc
  to pool/main/d/debsecan/debsecan_0.4.1.tar.gz
  to pool/main/d/debsecan/debsecan_0.4.1_all.deb

A summary of the changes between this version and the previous one is

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 349578 at bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
Florian Weimer <fw at deneb.enyo.de> (supplier of updated debsecan package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster at debian.org)

Hash: SHA1

Format: 1.7
Date: Wed, 25 Jan 2006 14:15:53 +0100
Source: debsecan
Binary: debsecan
Architecture: source all
Version: 0.4.1
Distribution: unstable
Urgency: low
Maintainer: Florian Weimer <fw at deneb.enyo.de>
Changed-By: Florian Weimer <fw at deneb.enyo.de>
 debsecan   - Debian Security Analyzer
Closes: 349578
 debsecan (0.4.1) unstable; urgency=low
   * urllib2 raises yet another exception when networking problems occur;
     handle it.  Closes: #349578.
 8894a0898d9fb448bd2eca8094d06e85 787 admin optional debsecan_0.4.1.dsc
 05c1ceffba0bad828d2d7c3045827af3 68922 admin optional debsecan_0.4.1.tar.gz
 53caced2aab1ebe6909c37c7f8167f42 19882 admin optional debsecan_0.4.1_all.deb

Version: GnuPG v1.4.1 (GNU/Linux)


More information about the Pkg-sysvinit-devel mailing list