summaryrefslogtreecommitdiff
path: root/generate_deps
diff options
context:
space:
mode:
authorDavid Wragg <david@rabbitmq.com>2010-07-13 01:49:28 +0100
committerDavid Wragg <david@rabbitmq.com>2010-07-13 01:49:28 +0100
commit354c3731cfa8fc71d523cfc0753bf9dccbc6fe42 (patch)
treebc727123514e0bd1324a072d0b0548c4fa3d5eb9 /generate_deps
parentd33f188d9423144fc0c743d06cb1992fc277c2ce (diff)
downloadrabbitmq-server-git-354c3731cfa8fc71d523cfc0753bf9dccbc6fe42.tar.gz
Remove IFS setting on the su command
The script has lots of IFS vulnerabilities before it reaches the su command. If we really want to guard against IFS, we should set it at the top. But how many shell scripts have you ever seen that do that? If the user sets IFS, and breaks things, it seem reasonable to regard that as their problem. There is no security issue here because you should already be root or the rabbitmq user to run the script.
Diffstat (limited to 'generate_deps')
0 files changed, 0 insertions, 0 deletions