Clarify the behavior of PATH_FSTAB with regard to 'tainted' execution.

Requested by:	 ru
This commit is contained in:
Matthew N. Dodd 2003-04-07 14:21:14 +00:00
parent b5855cd133
commit 564b641ef9
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=113224
3 changed files with 21 additions and 0 deletions

View File

@ -150,6 +150,13 @@ returns nothing.
If the environment variable
.Pa PATH_FSTAB
is set all operations are performed against the specified file.
.Pa PATH_FSTAB
will not be honored if the process environment or memory address space is
considred
.Dq tainted .
(See
.Fn issetugid
for more information.)
.El
.Sh FILES
.Bl -tag -width /etc/fstab -compact

View File

@ -417,6 +417,13 @@ support for a particular file system might be provided either on a static
If the environment variable
.Pa PATH_FSTAB
is set all operations are performed against the specified file.
.Pa PATH_FSTAB
will not be honored if the process environment or memory address space is
considred
.Dq tainted .
(See
.Fn issetugid
for more information.)
.El
.Sh FILES
.Bl -tag -width /etc/fstab -compact

View File

@ -126,6 +126,13 @@ is unmounted.
If the environment variable
.Pa PATH_FSTAB
is set all operations are performed against the specified file.
.Pa PATH_FSTAB
will not be honored if the process environment or memory address space is
considred
.Dq tainted .
(See
.Fn issetugid
for more information.)
.El
.Sh FILES
.Bl -tag -width /etc/fstab -compact