15e9ce8614
Incorporates the following changes from Anne Bennett (anne@alcor.concordia.ca) in PR 12538: (1) Running download-vulnerability-list as it stands from cron will spam the sysadmin with ftp output. Easy to fix: redirect output to /dev/null as per the example in pkg/MESSAGE. Problem: now we lose some error messages as well. Patch: make sure error complaints in that script are spouted to STDERR, not STDOUT. (3) Minor readability issue: set the source location for the vulnerability list in a variable at the top of the script. (4) PR 12457 reported that audit-packages complained spuriously when the vulnerability list had not been updated in over a week, and suggested touching it as a solution. This loses the information of when the file was really last updated. I'd prefer to always "mv" the new file into place, and use mtime instead of ctime in the file freshness test. I did this part of the PR differently, as I was worried about incomplete vulnerability lists being downloaded, and overwriting an existing vulnerability list: (2) ftp failure in download-vulnerability-list is not being detected properly by the current "${FETCH_CMD} .. || (complain; exit 1)" test. Patch: test for a non-zero vulnerability file instead. Don't forget to remove any zero-length droppings, if any. We know that the vulnerability list size will increase, and not decrease, so test the size of the newly-downloaded file. If the new file is smaller than the existing file, then a bad transfer has taken place - log this fact, and remove the new list. |
||
---|---|---|
.. | ||
audit-packages | ||
download-vulnerability-list |