[ << ] | [ < ] | [ Up ] | [ > ] | [ >> ] | [Top] | [Contents] | [Index] | [ ? ] |
In some cases tar
may be used in an adversarial situation,
where an untrusted user is attempting to gain information about or
modify otherwise-inaccessible files. Dealing with untrusted data
(that is, data generated by an untrusted user) typically requires
extra care, because even the smallest mistake in the use of
tar
is more likely to be exploited by an adversary than by a
race condition.
10.2.1 Privacy | ||
10.2.2 Integrity | ||
10.2.3 Dealing with Live Untrusted Data | ||
10.2.4 Security Rules of Thumb |
This document was generated on August 23, 2023 using texi2html 5.0.