diff options
| author | David Wragg <david@rabbitmq.com> | 2010-07-13 01:49:28 +0100 |
|---|---|---|
| committer | David Wragg <david@rabbitmq.com> | 2010-07-13 01:49:28 +0100 |
| commit | 354c3731cfa8fc71d523cfc0753bf9dccbc6fe42 (patch) | |
| tree | bc727123514e0bd1324a072d0b0548c4fa3d5eb9 /generate_deps | |
| parent | d33f188d9423144fc0c743d06cb1992fc277c2ce (diff) | |
| download | rabbitmq-server-git-354c3731cfa8fc71d523cfc0753bf9dccbc6fe42.tar.gz | |
Remove IFS setting on the su command
The script has lots of IFS vulnerabilities before it reaches the su
command. If we really want to guard against IFS, we should set it at
the top. But how many shell scripts have you ever seen that do that?
If the user sets IFS, and breaks things, it seem reasonable to regard
that as their problem. There is no security issue here because you
should already be root or the rabbitmq user to run the script.
Diffstat (limited to 'generate_deps')
0 files changed, 0 insertions, 0 deletions
