Dash as default shell
Bruno Wolff III
bruno at wolff.to
Thu Oct 2 16:22:18 UTC 2014
On Thu, Oct 02, 2014 at 11:59:54 -0400,
Miloslav Trmač <mitr at redhat.com> wrote:
>
>As I said in the snipped part, anyone able to submit arbitrary input to a shell can already cause it to do arbitrary things. The parser bugs do not give the attacker anything they don’t already have, so they are not security-relevant. So we are back to the philosophical discussion about where is the vulnerability in putting untrusted data into the environment.
I think the disconnect there was that people assumed that as long as
you controlled which environment variables (by name) were passed you
were OK. It was assumed that the values weren't processed outside
of what you explicitly did.
Unless the defining functions in environment values feature is disabled,
this expectation is still broken, regardless of the parser fix. And I
wouldn't be surprised if more issues come up in the future because of it.
More information about the devel
mailing list