Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

/etc/cron.daily/maldet: line 69: [: ==: unary operator expected #331

Closed
MajorFault opened this issue Apr 15, 2019 · 3 comments
Closed

/etc/cron.daily/maldet: line 69: [: ==: unary operator expected #331

MajorFault opened this issue Apr 15, 2019 · 3 comments

Comments

@MajorFault
Copy link

Version: Linux Malware Detect v1.6.4
OS: CentOS 7.6.1810

We receive daily error notifications from cron.daily/maldet:
/etc/cron.daily/maldet: line 69: [: ==: unary operator expected

Line 69 of /etc/cron.daily/maldet should be changed to:
elif [ "$cron_daily_scan" == "1" ]; then

@natereist
Copy link

Getting the same error notification this morning.

@Gazoo
Copy link
Contributor

Gazoo commented Apr 15, 2019

Yes I got the same thing. @rfxn pushed the 1.6.4 update to rfxn.com so I'm sure it will get fixed fast and hopefully it will be included when he creates the official 1.6.4 github release. Thanks again @rfxn for all your hard work!

rfxn added a commit that referenced this issue Apr 15, 2019
@rfxn
Copy link
Owner

rfxn commented Apr 15, 2019

Good catch all, thank you.

I've pushed a fix to 1.6.4 and updated the VERSION.hash so that LMD cron will pick up a change to internal files. You are likely to get one more syntax error email from cron.daily when it updates on next run with the fix.

You can pre-empt by running 'maldet -d --force' and it should pull down the fixed version.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants