Tar/Security

From Get docs

[ < ] [ > ]   [ << ] [ Up ] [ >> ]         [Top] [Contents] [Index] [ ? ]

10.2 Security

In some cases tar may be used in an adversarial situation, where an untrusted user is attempting to gain information about or modify otherwise-inaccessible files. Dealing with untrusted data (that is, data generated by an untrusted user) typically requires extra care, because even the smallest mistake in the use of tar is more likely to be exploited by an adversary than by a race condition.

10.2.1 Privacy   
10.2.2 Integrity   
10.2.3 Dealing with Live Untrusted Data   
10.2.4 Security Rules of Thumb   

This document was generated on February, 23 2019 using texi2html 1.76.