Sisyphus repository
Last update: 2017-08-23 04:05:47 +0400 | SRPMs: 17969 | Sign in or Sign up
en ru uk br
Group :: System/Configuration/Other
Source RPM: alterator-pkg

 Main   Changelog   Spec   Patches   Sources   Download   Gear   Bugs and FR (7/34)   Repocop 


package id status test message
alterator-pkg-2.6.21-alt1.noarch Ok
ok
checkbashisms  
alterator-pkg-2.6.21-alt1.noarch Fail
fail
unsafe-tmp-usage-in-scripts The test discovered scripts with errors which may be used by a user for damaging important system files. For example if a script uses in its work a temp file which is created in /tmp directory, then every user can create symlinks with the same name (pattern) in this directory in order to destroy or rewrite some system or another user's files. Scripts _must_ _use_ mktemp/tempfile or must use $TMPDIR. mktemp/tempfile is safest. $TMPDIR is safer than /tmp/ because libpam-tmpdir creates a subdirectory of /tmp that is only accessible by that user, and then sets TMPDIR and other variables to that. Hence, it doesn't matter nearly as much if you create a non-random filename, because nobody but you can access it. Found error in /usr/lib/alterator/backend3/pkg-size: $ grep -A5 -B5 /tmp/ /usr/lib/alterator/backend3/pkg-size echo "pkg-size:start" local tmpfile="$(make_manifest $in_lists)" if [ -s "$tmpfile" ]; then stderr_handler & echo "n"|apt-get --simple-output install --manifest "$tmpfile" 2>> /tmp/install2.log || rc=$? else echo "apt-get:status:disk-size:0k" fi rm -f "$tmpfile" echo "pkg-size:finish:$rc" Found error in /usr/lib/alterator/backend3/pkg-install: $ grep -A5 -B5 /tmp/ /usr/lib/alterator/backend3/pkg-install ;; write) case "$in__objects" in /) if test_bool "$in_auto"; then make_apt < /dev/null &> /tmp/pkg-install.log else start_pipe &> /tmp/pkg-install.log fi ;; notify) write_pipe "$in_message" ;;;
alterator-pkg-2.6.21-alt1.noarch Ok
ok
sisyphus_check  
alterator-pkg-2.6.21-alt1.noarch Ok
ok
buildroot  
 
© 2009–2017 Igor Zubkov