No, this issue comes from your https://src.fedoraproject.org/rpms/clamav-unofficial-sigs/blob/master/f/clamav-unofficial-sigs.cron#_29, not from shebang.
Note that /bin/bash
rather /usr/bin/bash
actually works for all Fedora/EPEL branches, which is most likely the best fix.
The cronjob [ -x /usr/sbin/clamav-unofficial-sigs.sh ] && /usr/bin/bash /usr/sbin/clamav-unofficial-sigs.sh
leads to /bin/sh: /usr/bin/bash: No such file or directory
, because on RHEL/CentOS 6, it's /bin/bash
all the time.
Fehler: Package: nagios-plugins-disk_smb-2.2.2-1.20190919git00cff01.el6.x86_64 (epel-testing)
Requires: perl(utf8::all)
fasulia, may I kindly ask you to open a bug report at bugzilla.redhat.com? I'm happy to forward this to upstream then, but as of writing, I'm not really sure whether I understand the issue. Thank you :)
mock -r epel-7-x86_64 rebuild <some-src.rpm>
The rebuild likely required a new cache, thus likely %post scriptlets with useradd/groupadd were performed.
Was this update ever tested? Mock poorly fails on RHEL 7.7 with SELinux errors when building a package:
type=AVC msg=audit(1565368068.535:11095): avc: denied { read } for pid=46206 comm="groupadd" name="run" dev="dm-0" ino=800267 scontext=unconfined_u:unconfined_r:groupadd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:mock_var_lib_t:s0 tclass=lnk_file permissive=0
type=SYSCALL msg=audit(1565368068.535:11095): arch=x86_64 syscall=connect success=no exit=EACCES a0=4 a1=7ffe52230040 a2=6e a3=40 items=0 ppid=46205 pid=46206 auid=3000051 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1118 comm=groupadd exe=/usr/sbin/groupadd subj=unconfined_u:unconfined_r:groupadd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1565368069.966:11119): avc: denied { write } for pid=46244 comm="groupadd" path="/dev/null" dev="dm-0" ino=800206 scontext=unconfined_u:unconfined_r:groupadd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:mock_var_lib_t:s0 tclass=chr_file permissive=0
type=AVC msg=audit(1565368069.966:11119): avc: denied { write } for pid=46244 comm="groupadd" path="/dev/null" dev="dm-0" ino=800206 scontext=unconfined_u:unconfined_r:groupadd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:mock_var_lib_t:s0 tclass=chr_file permissive=0
type=SYSCALL msg=audit(1565368069.966:11119): arch=x86_64 syscall=execve success=yes exit=0 a0=1a327b0 a1=1a2fd30 a2=1a31be0 a3=7ffda2580a60 items=0 ppid=46238 pid=46244 auid=3000051 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1118 comm=groupadd exe=/usr/sbin/groupadd subj=unconfined_u:unconfined_r:groupadd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1565368070.38:11132): avc: denied { write } for pid=46260 comm="useradd" path="/dev/null" dev="dm-0" ino=800206 scontext=unconfined_u:unconfined_r:useradd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:mock_var_lib_t:s0 tclass=chr_file permissive=0
type=AVC msg=audit(1565368070.38:11132): avc: denied { write } for pid=46260 comm="useradd" path="/dev/null" dev="dm-0" ino=800206 scontext=unconfined_u:unconfined_r:useradd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:mock_var_lib_t:s0 tclass=chr_file permissive=0
type=SYSCALL msg=audit(1565368070.38:11132): arch=x86_64 syscall=execve success=yes exit=0 a0=1a33270 a1=1a32d50 a2=1a31be0 a3=7ffda2580a60 items=0 ppid=46238 pid=46260 auid=3000051 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1118 comm=useradd exe=/usr/sbin/useradd subj=unconfined_u:unconfined_r:useradd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1565368070.44:11133): avc: denied { read } for pid=46260 comm="useradd" name="run" dev="dm-0" ino=800267 scontext=unconfined_u:unconfined_r:useradd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:mock_var_lib_t:s0 tclass=lnk_file permissive=0
type=SYSCALL msg=audit(1565368070.44:11133): arch=x86_64 syscall=connect success=no exit=EACCES a0=5 a1=7ffd92b62af0 a2=6e a3=11 items=0 ppid=46238 pid=46260 auid=3000051 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1118 comm=useradd exe=/usr/sbin/useradd subj=unconfined_u:unconfined_r:useradd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1565368096.180:11209): avc: denied { write } for pid=46732 comm="groupadd" name="group" dev="dm-0" ino=806120 scontext=unconfined_u:unconfined_r:groupadd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:etc_t:s0 tclass=file permissive=0
type=SYSCALL msg=audit(1565368096.180:11209): arch=x86_64 syscall=open success=no exit=EACCES a0=56463bb7f5a0 a1=20902 a2=0 a3=8 items=0 ppid=46730 pid=46732 auid=3000051 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1118 comm=groupadd exe=/usr/sbin/groupadd subj=unconfined_u:unconfined_r:groupadd_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1565368103.576:11285): avc: denied { write } for pid=46804 comm="restorecon" path="/dev/null" dev="dm-0" ino=800206 scontext=unconfined_u:unconfined_r:setfiles_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:mock_var_lib_t:s0 tclass=chr_file permissive=0
type=AVC msg=audit(1565368103.576:11285): avc: denied { write } for pid=46804 comm="restorecon" path="/dev/null" dev="dm-0" ino=800206 scontext=unconfined_u:unconfined_r:setfiles_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:mock_var_lib_t:s0 tclass=chr_file permissive=0
type=SYSCALL msg=audit(1565368103.576:11285): arch=x86_64 syscall=execve success=yes exit=0 a0=f64170 a1=f63b10 a2=f63920 a3=7ffd776df720 items=0 ppid=46799 pid=46804 auid=3000051 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1118 comm=restorecon exe=/usr/sbin/setfiles subj=unconfined_u:unconfined_r:setfiles_t:s0-s0:c0.c1023 key=(null)
Downgrading mock-1.4.17-1.el7.noarch to mock-1.4.16-1.el7.noarch solves the issue, thus this is not a RHEL 7.7, but a mock issue.
LGTM :)
From my point of view, the license tag does not match the actual license; https://src.fedoraproject.org/rpms/conspy/pull-request/1
Seems to break qt5-qtwebengine based applications
LGTM :)
LGTM :)
I am sorry, but libdvbv5-1.16.5-1.fc30 (previous update) and libdvbv5-1.16.5-2.fc30 (this update) are both just broken, they do not fix RHBZ #1695023 at all. The only working package is the old libdvbv5-1.16.3-2.fc30. Please unpush this broken update.
The problem is the error message in the initial comment (spewed by the default cron job) which renders the clamav-unofficial-sigs package quite useless by default on RHEL/CentOS 6, because clamd gets never notified (except for some whole system reboots) about any signature updates. This results from an obviously untested clamav-unofficial-sigs package update on RHEL/CentOS 6, given the issue exists reproducibly even with fresh clamav-unofficial-sigs installations, not just with updated clamav-unofficial-sigs installations. The conclusion are the fixes I submitted via pull requests.