summaryrefslogtreecommitdiffstats
path: root/doc/pacman-conf.8.asciidoc
diff options
context:
space:
mode:
authorAndrew Gregory <andrew.gregory.8@gmail.com>2019-06-09 18:56:36 +0200
committerAndrew Gregory <andrew.gregory.8@gmail.com>2019-10-12 16:04:20 +0200
commit808a4f15ce82d2ed7eeb06de73d0f313620558ee (patch)
tree9676438a2034e4cb7b0aba96b1512a8f8fa84efd /doc/pacman-conf.8.asciidoc
parenta82b0028e431dbd8bb3512c3193b52985da82ec2 (diff)
downloadpacman-808a4f15ce82d2ed7eeb06de73d0f313620558ee.tar.gz
pacman-808a4f15ce82d2ed7eeb06de73d0f313620558ee.tar.xz
run XferCommand via exec
system() runs the provided command via a shell, which is subject to command injection. Even though pacman already provides a mechanism to sign and verify the databases containing the urls, certain distributions have yet to get their act together and start signing databases, leaving them vulnerable to MITM attacks. Replacing the system call with an almost equivalent exec call removes the possibility of a shell-injection attack for those users. Signed-off-by: Andrew Gregory <andrew.gregory.8@gmail.com>
Diffstat (limited to 'doc/pacman-conf.8.asciidoc')
0 files changed, 0 insertions, 0 deletions