[Kroupware] build & install script for Kolab 1.0

Martin Konold martin.konold at erfrakon.de
Sun Jul 27 15:18:24 CEST 2003


Am Sonntag, 27. Juli 2003 10:53 schrieb Bernhard Erdmann:

Hi,

> It uses sudo to execute /kolab/bin/rpm as user root:
>
> /etc/sudoers:
> kolab   ALL=(ALL)       NOPASSWD: /kolab/bin/rpm

Isn't this a major local root exploit security problem?

> Some required packages are missing:
> perl-openpkg
> sed
> libiconv
> gettext
> imap

Fixed in cvs.

> One "-" is missing:
> rpm -ba postfix.spec --define 'with_sasl yes' \
> 	 -define 'with_tls yes' --define 'with_ldap yes'

Also fixed!

> In the subdir imapd is no file kolab.patch and "//" is no comment in bash:

Well, the QIM is not intended to be used as a shell script though I canged it 
anyway.

Regards,
-- martin

Dipl.-Phys. Martin Konold
e r f r a k o n
Erlewein, Frank, Konold & Partner - Beratende Ingenieure und Physiker
Nobelstrasse 15, 70569 Stuttgart, Germany
fon: 0711 67400963, fax: 0711 67400959
email: martin.konold at erfrakon.de



More information about the Kroupware mailing list