On 02/04/2014 06:27 PM, Kacper Wysocki wrote: >>> Does the problem still occur with git master branch tip revision? >> >> I'm afraid so. I just tried again against >> 9cc7f9757f140f105555999bb364bbca3fcc5a46 on a Debian i386 jessie system, >> and I got the same results: >> >> windlord:~/tmp/cpm> ./cpm >> Cannot drop root privileges. (695) > > Dang it. I'll try in a jessie i386 vm and get back to you.
I simply cannot reproduce this. We might have fixed it at some point between 0.28 and 0.31? CPM runs as expected on 32-bit jessie: == user@jessi386:~$ cpm --version cpm 0.31 (32 bit) CDK version 5.0 (20060507). GpgME version 1.4.3 (rcpt). ncursesw version 5.9 (20140118). XML2 version 2.9.1. zlib version 1.2.8. cracklib is enabled. Written by Harry Brueckner <harr...@mm.st> 2005-2009. Maintained by Kacper Wysocki <k...@redpill-linpro.com> 2010. user@jessi386:~$ cpm Running without root privileges: yes Memory protection from core dumps: yes Memory protection from swap writings: no Max. memory lock ok: no (64 kB) Memory protection from ptrace spying: yes Validation of environment variables: yes Cracklib dictionary (/var/cache/cracklib/cracklib_dict):yes Maximum security level not reached. Your database will be less protected while CPM is running. Are you sure you want to continue?
signature.asc
Description: OpenPGP digital signature