On Thu, Oct 02, 2014 at 11:59:54 -0400,
 Miloslav Trmač <m...@redhat.com> wrote:

As I said in the snipped part, anyone able to submit arbitrary input to a shell 
can already cause it to do arbitrary things. The parser bugs do not give the 
attacker anything they don’t already have, so they are not security-relevant. 
So we are back to the philosophical discussion about where is the vulnerability 
in putting untrusted data into the environment.

I think the disconnect there was that people assumed that as long as you controlled which environment variables (by name) were passed you were OK. It was assumed that the values weren't processed outside of what you explicitly did.

Unless the defining functions in environment values feature is disabled, this expectation is still broken, regardless of the parser fix. And I wouldn't be surprised if more issues come up in the future because of it.
--
devel mailing list
devel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct

Reply via email to