On 13:45 Mon 11 Aug , Joey Hess wrote: JH> Dmitry E. Oboukhov wrote: JH>> os-prober_1.17 os-prober /tmp/mounted-map (pipe) JH>> /tmp/raided-map (pipe) JH> os-prober writer to $OS_PROBER_TMP/{mounted-map.raided-map,etc}, which is created by: JH> if [ -z "$OS_PROBER_TMP" ]; then JH> if type mktemp >/dev/null 2>&1; then JH> export OS_PROBER_TMP="$(mktemp -d /tmp/os-prober.XXXXXX)" JH> trap "rm -rf $OS_PROBER_TMP" EXIT HUP INT QUIT TERM JH> else JH> export OS_PROBER_TMP=/tmp JH> fi JH> fi package: os-prober_1.17_i386.deb file: /usr/bin/os-prober $ grep '/tmp/' bin/os-prober grep "^/dev/" /proc/mounts | parse_proc_mounts >/tmp/mounted-map || true : >/tmp/raided-map grep "^md" /proc/mdstat | parse_proc_mdstat >/tmp/raided-map || true if grep -q "^$mapped" /tmp/raided-map ; then if ! grep -q "^$mapped " /tmp/mounted-map ; then mpoint=$(grep "^$mapped " /tmp/mounted-map | cut -d " " -f 2) type=$(grep "^$mapped " /tmp/mounted-map | cut -d " " -f 3) Oldstable 1.04 Stable 1.17 - in my list :) Testing 1.26 Unstable 1.27 script writes the /tmp/mounted-map and the /tmp/raided-map by pipe. new version (1.26) writes to $OS_PROBER_TMP/raided-map :) JH> This use of mktemp -d should be secure. JH> mktemp is a required package, so the insecure code path should only ever run inside JH> a d-i environment, which has no non-root users. -- ... mpd is off . ''`. Dmitry E. Oboukhov : :’ : unera@debian.org `. `~’ GPGKey: 1024D / F8E26537 2006-11-21 `- 1B23 D4F8 8EC0 D902 0555 E438 AB8C 00CF F8E2 6537
Attachment:
signature.asc
Description: Digital signature