]> code.ossystems Code Review - openembedded-core.git/commit
classes/sanity: check for suid root command evility
authorPaul Eggleton <paul.eggleton@linux.intel.com>
Thu, 1 Aug 2013 17:17:16 +0000 (18:17 +0100)
committerPaul Eggleton <paul.eggleton@linux.intel.com>
Wed, 7 Aug 2013 10:44:34 +0000 (11:44 +0100)
commit041342a518e1d33349eb52e11750e155a5647735
treecee5f5f3d6efadf4a5ced693caa1cf1d00f75784
parent3974ebead1be20e3687ab66e8782da70118a3202
classes/sanity: check for suid root command evility

Some users have been found to have an unnamed third-party piece of
software installed which sets chmod, chown and mknod as suid root as
part of its installation process. This interferes with the operation of
pseudo and can result in files really being owned by root within the
build output, and therefore breaks the build, apart from being a
security issue. Check for this and bail out if it is found.

Reported-by: Nicolas Dechesne <nicolas.dechesne@linaro.org>
(From OE-Core master rev: 08d61529f3c7a48ec82e1f8c9c28c7b2e5238934)

Signed-off-by: Paul Eggleton <paul.eggleton@linux.intel.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/classes/sanity.bbclass