Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 04 Jan 2001 21:21:17 +0200
From:      Mark Murray <mark@grondar.za>
To:        Garrett Wollman <wollman@khavrinen.lcs.mit.edu>
Cc:        cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   Re: cvs commit: src/usr.bin/apply apply.c 
Message-ID:  <200101041921.f04JLLY07292@gratis.grondar.za>
In-Reply-To: <200101041909.OAA61522@khavrinen.lcs.mit.edu> ; from Garrett Wollman <wollman@khavrinen.lcs.mit.edu>  "Thu, 04 Jan 2001 14:09:53 EST."
References:  <200101041909.OAA61522@khavrinen.lcs.mit.edu> 

next in thread | previous in thread | raw e-mail | index | archive | help
> <<On Thu, 4 Jan 2001 11:05:49 -0800 (PST), Will Andrews <will@FreeBSD.org> said:
> 
> >   Use getusershell() to make sure the SHELL environment variable passed is
> >   safe to use.  Add new option -s to allow anal users to pass things like
> >   perl; this option is here along with getusershell() checking since the
> >   such checking is only intended to affect things like suidperl that might
> >   call apply(1).
>   
> What is the reason for this change?

Source code clean-up A' la BDEFLAGS.

> I see no benefit in modifying many programs in this manner which do
> not ordinarily run with elevated privileges.

IMO, all programs that run ${SHELL} should do this. One less thing
to worry about.

Any runshell(3) call (I know there is not one ATM) should have
this functionality by default.

> It is the responsibility of those programs that do, to ensure that the
> environment passed to their children is safe and sane.

That is a fine supplement. We all know how well users write their
scripts :-).

M
-- 
Mark Murray
Warning: this .sig is umop ap!sdn


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200101041921.f04JLLY07292>