[Kroupware] build & install script for Kolab 1.0
Martin Konold
martin.konold at erfrakon.de
Sun Jul 27 15:18:24 CEST 2003
Am Sonntag, 27. Juli 2003 10:53 schrieb Bernhard Erdmann:
Hi,
> It uses sudo to execute /kolab/bin/rpm as user root:
>
> /etc/sudoers:
> kolab ALL=(ALL) NOPASSWD: /kolab/bin/rpm
Isn't this a major local root exploit security problem?
> Some required packages are missing:
> perl-openpkg
> sed
> libiconv
> gettext
> imap
Fixed in cvs.
> One "-" is missing:
> rpm -ba postfix.spec --define 'with_sasl yes' \
> -define 'with_tls yes' --define 'with_ldap yes'
Also fixed!
> In the subdir imapd is no file kolab.patch and "//" is no comment in bash:
Well, the QIM is not intended to be used as a shell script though I canged it
anyway.
Regards,
-- martin
Dipl.-Phys. Martin Konold
e r f r a k o n
Erlewein, Frank, Konold & Partner - Beratende Ingenieure und Physiker
Nobelstrasse 15, 70569 Stuttgart, Germany
fon: 0711 67400963, fax: 0711 67400959
email: martin.konold at erfrakon.de
More information about the Kroupware
mailing list