OXIESEC PANEL
- Current Dir:
/
/
usr
/
share
/
apport
/
package-hooks
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
π
..
-
05/09/2024 07:13:26 AM
rwxr-xr-x
π
apache2.py
1.77 KB
02/23/2021 04:35:16 PM
rw-r--r--
π
cloud-init.py
176 bytes
04/21/2023 07:44:30 PM
rw-r--r--
π
cryptsetup.py
1.06 KB
08/03/2020 09:28:48 PM
rw-r--r--
π
isc-dhcp-client.py
1.75 KB
02/26/2021 04:58:50 PM
rw-r--r--
π
openssh-client.py
1.14 KB
03/30/2022 01:17:14 PM
rw-r--r--
π
openssh-server.py
1011 bytes
03/30/2022 01:17:14 PM
rw-r--r--
π
postfix.py
2.68 KB
08/12/2021 12:43:19 PM
rw-r--r--
π
slapd.py
1.89 KB
05/12/2022 01:52:38 PM
rw-r--r--
π
source_apparmor.py
2.8 KB
03/22/2018 08:08:03 PM
rw-r--r--
π
source_apport.py
569 bytes
11/11/2019 09:57:56 PM
rw-r--r--
π
source_byobu.py
417 bytes
04/07/2016 10:05:52 PM
rw-r--r--
π
source_console-setup.py
374 bytes
04/23/2019 12:04:14 PM
rw-r--r--
π
source_debian-installer.py
1.86 KB
11/11/2019 09:57:56 PM
rw-r--r--
π
source_fontconfig.py
162 bytes
10/28/2017 05:14:27 PM
rw-r--r--
π
source_grub2.py
3.69 KB
02/01/2023 05:49:01 PM
rw-r--r--
π
source_linux-firmware.py
6.11 KB
11/11/2019 09:57:56 PM
rw-r--r--
π
source_linux-meta-oem-osp1.py
6.11 KB
11/11/2019 09:57:56 PM
rw-r--r--
π
source_linux-meta-oem.py
6.11 KB
11/11/2019 09:57:56 PM
rw-r--r--
π
source_linux-meta.py
6.11 KB
11/11/2019 09:57:56 PM
rw-r--r--
π
source_linux-nexus7.py
948 bytes
11/11/2019 09:57:56 PM
rw-r--r--
π
source_linux-oem-osp1.py
6.11 KB
11/11/2019 09:57:56 PM
rw-r--r--
π
source_linux-oem.py
6.11 KB
11/11/2019 09:57:56 PM
rw-r--r--
π
source_linux-signed-oem-osp1.py
6.11 KB
11/11/2019 09:57:56 PM
rw-r--r--
π
source_linux-signed-oem.py
6.11 KB
11/11/2019 09:57:56 PM
rw-r--r--
π
source_linux-signed.py
6.11 KB
11/11/2019 09:57:56 PM
rw-r--r--
π
source_linux.py
6.11 KB
11/11/2019 09:57:56 PM
rw-r--r--
π
source_mdadm.py
2.2 KB
01/14/2020 07:10:59 PM
rw-r--r--
π
source_mysql-5.7.py
2.46 KB
08/19/2021 04:34:52 PM
rw-r--r--
π
source_openjdk-lts.py
1.7 KB
05/09/2023 09:01:08 PM
rw-r--r--
π
source_plymouth.py
1.26 KB
04/04/2019 03:41:18 PM
rw-r--r--
π
source_shadow.py
720 bytes
11/29/2022 12:25:19 PM
rw-r--r--
π
source_shim-signed.py
1.95 KB
01/31/2023 11:57:37 AM
rw-r--r--
π
source_shim.py
1.95 KB
01/31/2023 11:57:37 AM
rw-r--r--
π
source_sudo.py
1.13 KB
04/04/2023 12:44:58 PM
rw-r--r--
π
source_ubiquity.py
7.55 KB
11/11/2019 09:57:56 PM
rw-r--r--
π
source_ubuntu-advantage-tools.py
1.22 KB
08/08/2024 02:00:59 PM
rw-r--r--
π
source_ubuntu-release-upgrader.py
2.19 KB
06/06/2019 06:46:11 PM
rw-r--r--
π
source_unattended-upgrades.py
705 bytes
02/17/2020 11:37:03 AM
rw-r--r--
π
source_update-manager.py
2.24 KB
09/10/2024 11:52:38 AM
rw-r--r--
π
systemd.py
872 bytes
03/02/2023 12:58:02 PM
rw-r--r--
π
udev.py
455 bytes
03/02/2023 12:58:02 PM
rw-r--r--
π
ureadahead.py
475 bytes
04/09/2019 09:01:18 PM
rw-r--r--
Editing: source_grub2.py
Close
# vim: set fileencoding=UTF-8 : '''apport package hook for grub2 Author: Jean-Baptiste Lallement <jeanbaptiste.lallement@gmail.com> This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. See http://www.gnu.org/copyleft/gpl.html for the full text of the license. ''' from __future__ import print_function from apport.hookutils import * import os import subprocess import re def check_shell_syntax(path): ''' Check the syntax of a shell script ''' try: with open(os.devnull, 'w') as devnull: subprocess.check_call(['/bin/sh', '-n', path], stderr=devnull) except subprocess.CalledProcessError: return False return True def check_shell_syntax_harder(path): ''' Check the syntax of a shell script ''' try: # sh -n is tempting, but not good enough. Consider this case: # # GRUB_CMDLINE_LINUX_DEFAULT=βquiet splash nomodesetβ # # The quotes are Unicode quotes, not valid in the shell and probably # caused by copying a line out of a web page. This is parsed as an # instruction to run the 'splash' command with argument 'nomodesetβ' # and with the GRUB_CMDLINE_LINUX_DEFAULT environment variable set # to 'βquiet'. 'sh -n' allows this because this is a valid parse # and it's possible that the command 'splash' might exist, but what # we need to know is whether sourcing the file will fail. # # Unfortunately this test may involve executing code. However, this # file is already sourced as root when running update-grub, so it # seems unlikely that this could do any further harm. with open(os.devnull, 'w') as devnull: subprocess.check_call( ['/bin/sh', '-ec', '. %s' % re.escape(path)], stderr=devnull) except subprocess.CalledProcessError: return False return True def add_info(report): if report['ProblemType'] == 'Package': # To detect if root fs is a loop device attach_file(report, '/proc/cmdline','ProcCmdLine') attach_default_grub(report, 'EtcDefaultGrub') attach_file_if_exists(report, '/boot/grub/device.map', 'DeviceMap') try: grub_d = '/etc/default/grub.d' for name in sorted(os.listdir(grub_d)): if name.endswith('.cfg'): key = 'EtcDefaultGrubD.' + path_to_key(name) attach_file_if_exists( report, os.path.join(grub_d, name), key) except OSError: pass invalid_grub_script = [] if not check_shell_syntax_harder('/etc/default/grub'): invalid_grub_script.append('/etc/default/grub') # Check scripts in /etc/grub.d since some users directly change # configuration there grubdir='/etc/grub.d' for f in os.listdir(grubdir): fullpath=os.path.join(grubdir, f) if f != 'README' and os.access(fullpath, os.X_OK) \ and not check_shell_syntax(fullpath): invalid_grub_script.append(fullpath) attach_file(report, fullpath) # TODO: Add some UI to ask if the user modified the invalid script # and if he still wants to report it if invalid_grub_script: report['InvalidGrubScript'] = ' '.join(invalid_grub_script) if __name__ == '__main__': r = {} r['ProblemType'] = 'Package' add_info(r) for k, v in r.items(): print('%s: "%s"' % (k, v)) print("========================================")