Eric Blake <ebl...@redhat.com> writes:

> Overkill.  The security hole arises because the problem, as it currently
> exists, is triggerable by ANY portable environment variable definition.

In the context of security you need to forget about portable.  You need
to think about the improbable.

Andreas.

-- 
Andreas Schwab, sch...@linux-m68k.org
GPG Key fingerprint = 58CA 54C7 6D53 942B 1756  01D3 44D5 214B 8276 4ED5
"And now for something completely different."

Reply via email to