Re: Avoid DoS vulnerability through unsafe default assignment

2022-08-01 Thread Chet Ramey
On 7/31/22 2:10 AM, Bruno Haible wrote: -: "${PERL='perl'}" +: "${PERL="perl"}" I had not expected that this would make a difference, but it does. This sequence of commands : "${F='perl'}" echo "F=$F" produces F='perl' POSIX is weird in some places... Single quotes aren't speci

Re: Avoid DoS vulnerability through unsafe default assignment

2022-07-30 Thread Bruno Haible
> -: "${PERL='perl'}" > +: "${PERL="perl"}" I had not expected that this would make a difference, but it does. This sequence of commands : ${A=perl} : ${B="perl"} : ${C='perl'} : "${D=perl}" : "${E="perl"}" : "${F='perl'}" echo "A=$A" echo "B=$B" echo "C=$C" echo "D=$D" echo "E=$E" echo "F=$F" p

Re: Avoid DoS vulnerability through unsafe default assignment

2022-07-30 Thread Bruno Haible
> 2022-07-23 Bruno Haible > > Avoid DoS vulnerability through unsafe default assignment. > See https://www.shellcheck.net/wiki/SC2223 . This change caused an error in gendocs.sh: Generating monolithic html... (env LANG= LC_MESSAGES= LC_ALL= LANGUAGE= makeinfo --no-

Avoid DoS vulnerability through unsafe default assignment

2022-07-23 Thread Bruno Haible
Bruno Haible Avoid DoS vulnerability through unsafe default assignment. See https://www.shellcheck.net/wiki/SC2223 . * MODULES.html.sh (func_tmpdir): Surround default assignment with double-quotes. * build-aux/bootstrap: Likewise. * build-aux