Date: Thu, 04 Jan 2001 21:21:17 +0200 From: Mark Murray <mark@grondar.za> To: Garrett Wollman <wollman@khavrinen.lcs.mit.edu> Cc: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: Re: cvs commit: src/usr.bin/apply apply.c Message-ID: <200101041921.f04JLLY07292@gratis.grondar.za> In-Reply-To: <200101041909.OAA61522@khavrinen.lcs.mit.edu> ; from Garrett Wollman <wollman@khavrinen.lcs.mit.edu> "Thu, 04 Jan 2001 14:09:53 EST." References: <200101041909.OAA61522@khavrinen.lcs.mit.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
> <<On Thu, 4 Jan 2001 11:05:49 -0800 (PST), Will Andrews <will@FreeBSD.org> said:
>
> > Use getusershell() to make sure the SHELL environment variable passed is
> > safe to use. Add new option -s to allow anal users to pass things like
> > perl; this option is here along with getusershell() checking since the
> > such checking is only intended to affect things like suidperl that might
> > call apply(1).
>
> What is the reason for this change?
Source code clean-up A' la BDEFLAGS.
> I see no benefit in modifying many programs in this manner which do
> not ordinarily run with elevated privileges.
IMO, all programs that run ${SHELL} should do this. One less thing
to worry about.
Any runshell(3) call (I know there is not one ATM) should have
this functionality by default.
> It is the responsibility of those programs that do, to ensure that the
> environment passed to their children is safe and sane.
That is a fine supplement. We all know how well users write their
scripts :-).
M
--
Mark Murray
Warning: this .sig is umop ap!sdn
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200101041921.f04JLLY07292>
