Mon, 20 Apr 2009 19:22:00 +0200
Change unfortunate but partly useful overreaching security tradeoff.
The principle of allocating each running process an individual system
user and group can have security benefits, however maintining a plethora
of users, groups, processes, file modes, file permissions, and even
nonportable file ACLs on a host serving from a hundred processes has
some security disadvantages. This tradeoff is even worse for systems
like OpenPKG which benefit from administration transparency through the
use of minimal system intrusion and only three usage privilege levels.
michael@18 | 1 | Index: lib/buildreq.c |
michael@18 | 2 | --- lib/buildreq.c.orig 2005-07-21 01:01:07.000000000 -0700 |
michael@18 | 3 | +++ lib/buildreq.c 2008-02-23 16:33:08.000000000 -0800 |
michael@18 | 4 | @@ -89,10 +89,14 @@ |
michael@18 | 5 | } |
michael@18 | 6 | |
michael@18 | 7 | rewind(sf); |
michael@18 | 8 | - if (fscanf(sf, "%d", &seq_nbr) != 1) { |
michael@18 | 9 | + /* comment the following block out to work around some broken */ |
michael@18 | 10 | + /* libc distros which return 0 on successful fscanf(3) calls, */ |
michael@18 | 11 | + /* and use the simple replacement follwing the block instead. */ |
michael@18 | 12 | + /*if (fscanf(sf, "%d", &seq_nbr) != 1) { |
michael@18 | 13 | rc_log(LOG_ERR,"rc_get_seqnbr: fscanf failure: %s", seqfile); |
michael@18 | 14 | seq_nbr = rc_guess_seqnbr(); |
michael@18 | 15 | - } |
michael@18 | 16 | + }*/ |
michael@18 | 17 | + fscanf(sf, "%d", &seq_nbr); |
michael@18 | 18 | |
michael@18 | 19 | rewind(sf); |
michael@18 | 20 | ftruncate(fileno(sf),0); |