Skip to content
  • Andrew Gregory's avatar
    run XferCommand via exec · 808a4f15
    Andrew Gregory authored
    
    
    system() runs the provided command via a shell, which is subject to
    command injection.  Even though pacman already provides a mechanism to
    sign and verify the databases containing the urls, certain distributions
    have yet to get their act together and start signing databases, leaving
    them vulnerable to MITM attacks.  Replacing the system call with an
    almost equivalent exec call removes the possibility of a shell-injection
    attack for those users.
    
    Signed-off-by: default avatarAndrew Gregory <andrew.gregory.8@gmail.com>
    808a4f15