On 02/04/2014 06:27 PM, Kacper Wysocki wrote:
>>> Does the problem still occur with git master branch tip revision?
>>
>> I'm afraid so.  I just tried again against
>> 9cc7f9757f140f105555999bb364bbca3fcc5a46 on a Debian i386 jessie system,
>> and I got the same results:
>>
>> windlord:~/tmp/cpm> ./cpm
>> Cannot drop root privileges. (695)
> 
> Dang it. I'll try in a jessie i386 vm and get back to you.

I simply cannot reproduce this.

We might have fixed it at some point between 0.28 and 0.31?

CPM runs as expected on 32-bit jessie:

==


user@jessi386:~$ cpm --version
cpm 0.31 (32 bit)
CDK version 5.0 (20060507).
GpgME version 1.4.3 (rcpt).
ncursesw version 5.9 (20140118).
XML2 version 2.9.1.
zlib version 1.2.8.
cracklib is enabled.
Written by Harry Brueckner <harr...@mm.st> 2005-2009.
Maintained by Kacper Wysocki <k...@redpill-linpro.com> 2010.

user@jessi386:~$ cpm
Running without root privileges:                  yes
Memory protection from core dumps:                yes
Memory protection from swap writings:             no
Max. memory lock ok:                              no (64 kB)
Memory protection from ptrace spying:             yes
Validation of environment variables:              yes
Cracklib dictionary (/var/cache/cracklib/cracklib_dict):yes

Maximum security level not reached. Your database will be less protected
while CPM is running.
Are you sure you want to continue?


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to