Repository : http://git.fedorahosted.org/git/?p=secure-coding.git On branch : master >--------------------------------------------------------------- commit b7ec6fc7882d999c57ce47fc0b667c2c96647c7c Author: Florian Weimer <fweimer@xxxxxxxxxx> Date: Mon Oct 13 09:34:16 2014 +0200 Shell: Fix internal reference Spotted by Kamil Dudka. Also use "double expansion" consistently. >--------------------------------------------------------------- defensive-coding/en-US/Shell.xml | 6 +++--- 1 files changed, 3 insertions(+), 3 deletions(-) diff --git a/defensive-coding/en-US/Shell.xml b/defensive-coding/en-US/Shell.xml index 042ac61..f889dc1 100644 --- a/defensive-coding/en-US/Shell.xml +++ b/defensive-coding/en-US/Shell.xml @@ -93,7 +93,7 @@ external-program "$arg1" "$arg2" shell scripts difficult. </para> <para> - Double evaluation can be requested explicitly with the + Double expansion can be requested explicitly with the <literal>eval</literal> built-in command, or by invoking a subshell with â??<literal>bash -c</literal>â??. These constructs should not be used. @@ -108,8 +108,8 @@ external-program "$arg1" "$arg2" <emphasis>Arithmetic evaluation</emphasis> is a process by which the shell computes the integer value of an expression specified as a string. It is highly problematic for two reasons: It - triggers double evaluation (see <xref - linkend="sect-Defensive_Coding-Shell-Arithmetic"/>), and the + triggers double expansion (see <xref + linkend="sect-Defensive_Coding-Shell-Double_Expansion"/>), and the language of arithmetic expressions is not self-contained. Some constructs in arithmetic expressions (notably array subscripts) provide a trapdoor from the restricted language of arithmetic
-- security mailing list security@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/security