[ << ] | [ < ] | [ Up ] | [ > ] | [ >> ] | [Top] | [Contents] | [Index] | [ ? ] |
10.2 Security
In some cases tar
may be used in an adversarial situation,
where an untrusted user is attempting to gain information about or
modify otherwise-inaccessible files. Dealing with untrusted data
(that is, data generated by an untrusted user) typically requires
extra care, because even the smallest mistake in the use of
tar
is more likely to be exploited by an adversary than by a
race condition.
10.2.1 Privacy | ||
10.2.2 Integrity | ||
10.2.3 Dealing with Live Untrusted Data | ||
10.2.4 Security Rules of Thumb |
This document was generated on November 1, 2013 using texi2html 5.0.