Package netinst-overlays: Repocop

Status
Test name
Message
netinst-overlays-0.03-alt1noarch
ok
checkbashismsApr 25, 2024, 02:29 AM-
netinst-overlays-0.03-alt1noarch
skip
init-condrestartApr 25, 2024, 02:29 AM-
netinst-overlays-0.03-alt1noarch
skip
iconsdirApr 25, 2024, 02:29 AM-
netinst-overlays-0.03-alt1noarch
ok
sisyphus_checkApr 25, 2024, 02:29 AM-
netinst-overlays-0.03-alt1noarch
info
missing-urlApr 25, 2024, 02:29 AMMissing Url: in a package.;
netinst-overlays-0.03-alt1noarch
ok
buildrootApr 25, 2024, 02:29 AM-
netinst-overlays-0.03-alt1noarch
error
unsafe-tmp-usage-in-scriptsSep 12, 2022, 05:41 AMThe test discovered scripts with errors which may be used by a user for damaging important system files. For example if a script uses in its work a temp file which is created in /tmp directory, then every user can create symlinks with the same name (pattern) in this directory in order to destroy or rewrite some system or another user's files. Scripts _must_ _use_ mktemp/tempfile or must use $TMPDIR. mktemp/tempfile is safest. $TMPDIR is safer than /tmp/ because libpam-tmpdir creates a subdirectory of /tmp that is only accessible by that user, and then sets TMPDIR and other variables to that. Hence, it doesn't matter nearly as much if you create a non-random filename, because nobody but you can access it. Found error in /usr/bin/overlays-manage: $ grep -A5 -B5 /tmp/ /usr/bin/overlays-manage ExCmd() { # archive file local D D="`mktemp -d`" unsquashfs -d "$D/1" "$1" "$2" cat "$D/1/$2" find "$D" >> /tmp/log 2>&1 rm -rf "$D" } EXTMP= ADDHOSTS="" # what hosts want their hostkey on diskless DST="`logname`@`hostname`" # where to copy overlays;