Date: Tue, 01 Dec 2009 13:26:52 +0100 From: Dan Lukes <dan@obluda.cz> To: freebsd-security@freebsd.org Subject: Re: Upcoming FreeBSD Security Advisory Message-ID: <4B150B8C.90402@obluda.cz> In-Reply-To: <4B1503CB.3080405@nruns.com> References: <200912010120.nB11Kjm9087476@freefall.freebsd.org> <ov3Jq1IJ/c8KAXGQ501G8Os9xr8@Ll2tHa60cb%2BhiG8R4R8/VS21128> <20091201114845.359731A828F@mailv.nruns.com> <4B1503CB.3080405@nruns.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Jan Muenther napsal/wrote, On 12/01/09 12:53:
> I'd be greatly surprised if the affected code looked different in 6.x.
True, affected code is same. But unsetenv() "return" 'void' on 6.x, so
the code can't be patched the same way as in 7.x/8.x/HEAD
We need something like
if (getenv(...) != NULL ) {
unsetenv(...);
if (getenv(...) != NULL )
ABORT - BROKEN ENVIRONMENT
}
Dan
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B150B8C.90402>
