Repository : http://git.fedorahosted.org/git/?p=secure-coding.git

On branch  : master

>---------------------------------------------------------------

commit b7ec6fc7882d999c57ce47fc0b667c2c96647c7c
Author: Florian Weimer <fwei...@redhat.com>
Date:   Mon Oct 13 09:34:16 2014 +0200

    Shell: Fix internal reference
    
    Spotted by Kamil Dudka.
    
    Also use "double expansion" consistently.


>---------------------------------------------------------------

 defensive-coding/en-US/Shell.xml |    6 +++---
 1 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/defensive-coding/en-US/Shell.xml b/defensive-coding/en-US/Shell.xml
index 042ac61..f889dc1 100644
--- a/defensive-coding/en-US/Shell.xml
+++ b/defensive-coding/en-US/Shell.xml
@@ -93,7 +93,7 @@ external-program "$arg1" "$arg2"
     shell scripts difficult.
   </para>
   <para>
-    Double evaluation can be requested explicitly with the
+    Double expansion can be requested explicitly with the
     <literal>eval</literal> built-in command, or by invoking a
     subshell with “<literal>bash -c</literal>”.  These constructs
     should not be used.
@@ -108,8 +108,8 @@ external-program "$arg1" "$arg2"
       <emphasis>Arithmetic evaluation</emphasis> is a process by which
       the shell computes the integer value of an expression specified
       as a string.  It is highly problematic for two reasons: It
-      triggers double evaluation (see <xref
-      linkend="sect-Defensive_Coding-Shell-Arithmetic"/>), and the
+      triggers double expansion (see <xref
+      linkend="sect-Defensive_Coding-Shell-Double_Expansion"/>), and the
       language of arithmetic expressions is not self-contained.  Some
       constructs in arithmetic expressions (notably array subscripts)
       provide a trapdoor from the restricted language of arithmetic

--
security mailing list
security@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/security

Reply via email to