Article 67QT4 Surprising consequences of macOS’ environment variable sanitization

Surprising consequences of macOS’ environment variable sanitization

by
Thom Holwerda
from OSnews on (#67QT4)

One unfortunate fact of my life is that I have to deal with an obscure database whose macOS drivers require the addition of a directory to DYLD_LIBRARY_PATH for their Python driver to find them. To make matters worse, Apple's CLI tools strip that variable away as part of macOS's System Integrity Protection (SIP) before running a command.

Given that DYLD_* environment variables are a known attack vector for Mac malware, that's a good thing in general. However, sometimes one needs a workaround to get the job done.

Some of this made sense to me.

External Content
Source RSS or Atom Feed
Feed Location http://www.osnews.com/files/recent.xml
Feed Title OSnews
Feed Link https://www.osnews.com/
Reply 0 comments