> Eventually there will protocol or text side bug in xterm, and someone
> will figure out ways to escalate beyond our other mitigations.  Rather
> than forcing them to operate inside an uncomfortable less-than-POSIX
> pledge+unveil environment, they can reuse a simple 1996-era shell-egg to
> execve straight to a fresh shell for their pleasure.  Because pledge
> "proc exec" lets them do so.

But should it not be up to us to make sure that these exploits are
mitigated? Is it not our responsibility to properly go through all of
the changes made to applications in the source tree to make sure they're
secure?

Reply via email to