diff options
author | Tomasz Konojacki <me@xenu.pl> | 2022-04-19 16:41:23 +0200 |
---|---|---|
committer | xenu <me@xenu.pl> | 2022-05-29 00:54:10 +0200 |
commit | ae6b6b71cdbfb3fb6e1192178fa1e530a2f07ece (patch) | |
tree | 19d644c0277a598f8f5b2062ef20b43d78591c61 /INSTALL | |
parent | b95d23342a119c6677aa5ad786ca7d002c98bef2 (diff) | |
download | perl-ae6b6b71cdbfb3fb6e1192178fa1e530a2f07ece.tar.gz |
make PERL_USE_SAFE_PUTENV the default and the only option
Now environ isn't owned by Perl and calling setenv/putenv in XS code
will no longer result in memory corruption.
Fixes #19399
Diffstat (limited to 'INSTALL')
-rw-r--r-- | INSTALL | 15 |
1 files changed, 0 insertions, 15 deletions
@@ -637,21 +637,6 @@ architecture-dependent library for your -DDEBUGGING version of perl. You can do this by changing all the *archlib* variables in config.sh to point to your new architecture-dependent library. -=head3 Environment access - -Perl often needs to write to the program's environment, such as when -C<%ENV> is assigned to. Many implementations of the C library function -C<putenv()> leak memory, so where possible perl will manipulate the -environment directly to avoid these leaks. The default is now to perform -direct manipulation whenever perl is running as a stand alone interpreter, -and to call the safe but potentially leaky C<putenv()> function when the -perl interpreter is embedded in another application. You can force perl -to always use C<putenv()> by compiling with -C<-Accflags="-DPERL_USE_SAFE_PUTENV">, see section L</"Altering Configure -variables for C compiler switches etc.">. You can force an embedded perl -to use direct manipulation by setting C<PL_use_safe_putenv = 0;> after -the C<perl_construct()> call. - =head3 External glob Before File::Glob entered core in 5.6.0 globbing was implemented by shelling |