GNU tar 1.34: 10.2 Security
From Get docs
Tar/docs/latest/Security
[ << ] | [ < ] | [ Up ] | [ > ] | [ >> ] | [Top] | [Contents] | [Index] | [ ? ] |
10.2 Security
In some cases tar
may be used in an adversarial situation, where an untrusted user is attempting to gain information about or modify otherwise-inaccessible files. Dealing with untrusted data (that is, data generated by an untrusted user) typically requires extra care, because even the smallest mistake in the use of tar
is more likely to be exploited by an adversary than by a race condition.
10.2.1 Privacy | ||
10.2.2 Integrity | ||
10.2.3 Dealing with Live Untrusted Data | ||
10.2.4 Security Rules of Thumb |
This document was generated on March 24, 2021 using texi2html 5.0.