Date: Thu, 04 Jan 2001 21:21:17 +0200 From: Mark Murray <mark@grondar.za> To: Garrett Wollman <wollman@khavrinen.lcs.mit.edu> Cc: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: Re: cvs commit: src/usr.bin/apply apply.c Message-ID: <200101041921.f04JLLY07292@gratis.grondar.za> In-Reply-To: <200101041909.OAA61522@khavrinen.lcs.mit.edu> ; from Garrett Wollman <wollman@khavrinen.lcs.mit.edu> "Thu, 04 Jan 2001 14:09:53 EST." References: <200101041909.OAA61522@khavrinen.lcs.mit.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
> <<On Thu, 4 Jan 2001 11:05:49 -0800 (PST), Will Andrews <will@FreeBSD.org> said: > > > Use getusershell() to make sure the SHELL environment variable passed is > > safe to use. Add new option -s to allow anal users to pass things like > > perl; this option is here along with getusershell() checking since the > > such checking is only intended to affect things like suidperl that might > > call apply(1). > > What is the reason for this change? Source code clean-up A' la BDEFLAGS. > I see no benefit in modifying many programs in this manner which do > not ordinarily run with elevated privileges. IMO, all programs that run ${SHELL} should do this. One less thing to worry about. Any runshell(3) call (I know there is not one ATM) should have this functionality by default. > It is the responsibility of those programs that do, to ensure that the > environment passed to their children is safe and sane. That is a fine supplement. We all know how well users write their scripts :-). M -- Mark Murray Warning: this .sig is umop ap!sdn To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200101041921.f04JLLY07292>