parallel/20251222 package update #76761
+2
−2
Open
Octo STS / staging-autofix
completed
Dec 24, 2025 in 0s
Pull request does not have the "staging-autofix" label
ci-mal-report
The build of 'parallel-doc' packages for both aarch64 and x86_64 architectures failed due to critical security findings reported by a 'malcontent scan' in the documentation files. The scan identified issues such as directory changes, semicolon relative paths, and high-risk fetch commands.
❌ Other error @ /usr/share/doc/parallel/parallel_alternatives.rst |
Command:malcontent scan |
Diagnostic:Malcontent scan detected critical security risks in documentation files `/usr/share/doc/parallel/parallel_alternatives.rst` and `/usr/share/doc/parallel/parallel_alternatives.texi` for aarch64. |
Log Snippets:Indicates a potential security risk where documentation attempts to change directories to sensitive locations.changes current working directory to /var/{log,run,tmp}
Specific example of a directory change to a log directory.cd /var/log Highlights a security vulnerability related to command injection via semicolon-separated paths.semicolon relative path high Example of a semicolon relative path that could lead to arbitrary command execution.com; ./do_next_thing Another example of a semicolon relative path vulnerability.success; ./do_next_thing Identifies the presence of commands that can fetch external content, posing supply chain risks.high-risk fetch command A high-risk command that can alter file permissions, potentially leading to privilege escalation.chmod A high-risk fetch command that downloads content from a URL, potentially introducing malicious code.curl -O $u' Another high-risk fetch command with silent and location-following options, often used in malicious scripts.curl -s -L -O' |
❌ Other error @ /usr/share/doc/parallel/parallel_alternatives.rst |
Command:malcontent scan |
Diagnostic:Malcontent scan detected critical security risks in documentation files `/usr/share/doc/parallel/parallel_alternatives.rst` and `/usr/share/doc/parallel/parallel_alternatives.texi` for x86_64. |
Log Snippets:Indicates a potential security risk where documentation attempts to change directories to sensitive locations.changes current working directory to /var/{log,run,tmp}
Specific example of a directory change to a log directory.cd /var/log Highlights a security vulnerability related to command injection via semicolon-separated paths.semicolon relative path high Example of a semicolon relative path that could lead to arbitrary command execution.com; ./do_next_thing Another example of a semicolon relative path vulnerability.success; ./do_next_thing Identifies the presence of commands that can fetch external content, posing supply chain risks.high-risk fetch command A high-risk command that can alter file permissions, potentially leading to privilege escalation.chmod A high-risk fetch command that downloads content from a URL, potentially introducing malicious code.curl -O $u' Another high-risk fetch command with silent and location-following options, often used in malicious scripts.curl -s -L -O' |
Loading