Skip to content

Merge branch 'main' into staging-update-bot/parallel.yaml

41e434d
Select commit
Loading
Failed to load commit list.
Open

parallel/20251222 package update #76761

Merge branch 'main' into staging-update-bot/parallel.yaml
41e434d
Select commit
Loading
Failed to load commit list.
Octo STS / staging-autofix completed Dec 24, 2025 in 0s

Pull request does not have the "staging-autofix" label

ci-mal-report

The build of 'parallel-doc' packages for both aarch64 and x86_64 architectures failed due to critical security findings reported by a 'malcontent scan' in the documentation files. The scan identified issues such as directory changes, semicolon relative paths, and high-risk fetch commands.

❌ Other error @ /usr/share/doc/parallel/parallel_alternatives.rst
Command:
malcontent scan
Diagnostic:
Malcontent scan detected critical security risks in documentation files `/usr/share/doc/parallel/parallel_alternatives.rst` and `/usr/share/doc/parallel/parallel_alternatives.texi` for aarch64.
Log Snippets:
Indicates a potential security risk where documentation attempts to change directories to sensitive locations.
changes current working directory to /var/{log,run,tmp}

Specific example of a directory change to a log directory.
cd /var/log

Highlights a security vulnerability related to command injection via semicolon-separated paths.
semicolon relative path high

Example of a semicolon relative path that could lead to arbitrary command execution.
com; ./do_next_thing

Another example of a semicolon relative path vulnerability.
success; ./do_next_thing

Identifies the presence of commands that can fetch external content, posing supply chain risks.
high-risk fetch command

A high-risk command that can alter file permissions, potentially leading to privilege escalation.
chmod

A high-risk fetch command that downloads content from a URL, potentially introducing malicious code.
curl -O $u'

Another high-risk fetch command with silent and location-following options, often used in malicious scripts.
curl -s -L -O'

❌ Other error @ /usr/share/doc/parallel/parallel_alternatives.rst
Command:
malcontent scan
Diagnostic:
Malcontent scan detected critical security risks in documentation files `/usr/share/doc/parallel/parallel_alternatives.rst` and `/usr/share/doc/parallel/parallel_alternatives.texi` for x86_64.
Log Snippets:
Indicates a potential security risk where documentation attempts to change directories to sensitive locations.
changes current working directory to /var/{log,run,tmp}

Specific example of a directory change to a log directory.
cd /var/log

Highlights a security vulnerability related to command injection via semicolon-separated paths.
semicolon relative path high

Example of a semicolon relative path that could lead to arbitrary command execution.
com; ./do_next_thing

Another example of a semicolon relative path vulnerability.
success; ./do_next_thing

Identifies the presence of commands that can fetch external content, posing supply chain risks.
high-risk fetch command

A high-risk command that can alter file permissions, potentially leading to privilege escalation.
chmod

A high-risk fetch command that downloads content from a URL, potentially introducing malicious code.
curl -O $u'

Another high-risk fetch command with silent and location-following options, often used in malicious scripts.
curl -s -L -O'