linux/Documentation/translations/zh_TW/arch
Vegard Nossum c48a7c44a1 docs: kernel_feat.py: fix potential command injection
The kernel-feat directive passes its argument straight to the shell.
This is unfortunate and unnecessary.

Let's always use paths relative to $srctree/Documentation/ and use
subprocess.check_call() instead of subprocess.Popen(shell=True).

This also makes the code shorter.

This is analogous to commit 3231dd5862 ("docs: kernel_abi.py: fix
command injection") where we did exactly the same thing for
kernel_abi.py, somehow I completely missed this one.

Link: https://fosstodon.org/@jani/111676532203641247
Reported-by: Jani Nikula <jani.nikula@intel.com>
Signed-off-by: Vegard Nossum <vegard.nossum@oracle.com>
Cc: stable@vger.kernel.org
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
Link: https://lore.kernel.org/r/20240110174758.3680506-1-vegard.nossum@oracle.com
2024-01-11 09:21:01 -07:00
..
arm docs/zh_TW: update contents for zh_TW 2023-10-11 16:47:27 -06:00
arm64 docs/zh_TW: replace my email address 2023-11-17 08:57:11 -07:00
loongarch docs: kernel_feat.py: fix potential command injection 2024-01-11 09:21:01 -07:00
mips docs: kernel_feat.py: fix potential command injection 2024-01-11 09:21:01 -07:00
openrisc docs/zh_TW: update contents for zh_TW 2023-10-11 16:47:27 -06:00
parisc docs/zh_TW: update contents for zh_TW 2023-10-11 16:47:27 -06:00
index.rst docs/zh_TW: update contents for zh_TW 2023-10-11 16:47:27 -06:00