-DNO_DOT_PATH -> -DIGNORE_DOT_PATH
This commit is contained in:
2
OPTIONS
2
OPTIONS
@@ -153,7 +153,7 @@ SECURE_PATH
|
|||||||
NOTE: SECURE_PATH is not applied to users in the EXEMPTGROUP.
|
NOTE: SECURE_PATH is not applied to users in the EXEMPTGROUP.
|
||||||
This is off by default.
|
This is off by default.
|
||||||
|
|
||||||
NO_DOT_PATH
|
IGNORE_DOT_PATH
|
||||||
If defined, sudo will ignore '.' or '' (current dir) in $PATH.
|
If defined, sudo will ignore '.' or '' (current dir) in $PATH.
|
||||||
The $PATH itself is not modified.
|
The $PATH itself is not modified.
|
||||||
This is off by default.
|
This is off by default.
|
||||||
|
12
find_path.c
12
find_path.c
@@ -99,9 +99,9 @@ char * find_path(file)
|
|||||||
char *path = NULL; /* contents of PATH env var */
|
char *path = NULL; /* contents of PATH env var */
|
||||||
char *origpath; /* so we can free path later */
|
char *origpath; /* so we can free path later */
|
||||||
char *result = NULL; /* result of path/file lookup */
|
char *result = NULL; /* result of path/file lookup */
|
||||||
#ifndef NO_DOT_PATH
|
#ifndef IGNORE_DOT_PATH
|
||||||
int checkdot = 0; /* check current dir? */
|
int checkdot = 0; /* check current dir? */
|
||||||
#endif /* NO_DOT_PATH */
|
#endif /* IGNORE_DOT_PATH */
|
||||||
|
|
||||||
command[0] = '\0';
|
command[0] = '\0';
|
||||||
|
|
||||||
@@ -150,9 +150,9 @@ char * find_path(file)
|
|||||||
* things like using './' or './/'
|
* things like using './' or './/'
|
||||||
*/
|
*/
|
||||||
if (*path == '\0' || (*path == '.' && *(path + 1) == '\0')) {
|
if (*path == '\0' || (*path == '.' && *(path + 1) == '\0')) {
|
||||||
#ifndef NO_DOT_PATH
|
#ifndef IGNORE_DOT_PATH
|
||||||
checkdot = 1;
|
checkdot = 1;
|
||||||
#endif /* NO_DOT_PATH */
|
#endif /* IGNORE_DOT_PATH */
|
||||||
path = n + 1;
|
path = n + 1;
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
@@ -173,13 +173,13 @@ char * find_path(file)
|
|||||||
|
|
||||||
} while (n);
|
} while (n);
|
||||||
|
|
||||||
#ifndef NO_DOT_PATH
|
#ifndef IGNORE_DOT_PATH
|
||||||
/*
|
/*
|
||||||
* check current dir if dot was in the PATH
|
* check current dir if dot was in the PATH
|
||||||
*/
|
*/
|
||||||
if (!result && checkdot)
|
if (!result && checkdot)
|
||||||
result = sudo_goodpath(file);
|
result = sudo_goodpath(file);
|
||||||
#endif /* NO_DOT_PATH */
|
#endif /* IGNORE_DOT_PATH */
|
||||||
|
|
||||||
(void) free(origpath);
|
(void) free(origpath);
|
||||||
|
|
||||||
|
@@ -56,7 +56,7 @@
|
|||||||
#define INCORRECT_PASSWORD "Sorry, try again." /* message for bad passwd */
|
#define INCORRECT_PASSWORD "Sorry, try again." /* message for bad passwd */
|
||||||
#define MAILSUBJECT "*** SECURITY information ***" /* subject of mail sent */
|
#define MAILSUBJECT "*** SECURITY information ***" /* subject of mail sent */
|
||||||
#define PASSPROMPT "Password:" /* default password prompt */
|
#define PASSPROMPT "Password:" /* default password prompt */
|
||||||
/*#define NO_DOT_PATH /* ignore '.' if in $PATH */
|
/*#define IGNORE_DOT_PATH /* ignore '.' in $PATH if it exists */
|
||||||
/*#define SECURE_PATH "/bin:/usr/ucb:/usr/bin:/usr/etc:/etc" /* secure path */
|
/*#define SECURE_PATH "/bin:/usr/ucb:/usr/bin:/usr/etc:/etc" /* secure path */
|
||||||
/*#define USE_EXECV /* use execv() instead of execvp() */
|
/*#define USE_EXECV /* use execv() instead of execvp() */
|
||||||
/*#define SHELL_IF_NO_ARGS /* if sudo is given no arguments run a shell */
|
/*#define SHELL_IF_NO_ARGS /* if sudo is given no arguments run a shell */
|
||||||
|
Reference in New Issue
Block a user