aboutsummaryrefslogtreecommitdiffstats
path: root/README.md
Commit message (Collapse)AuthorAgeFilesLines
* README: add Known Caveats section.Kaz Kylheku2022-07-251-0/+15
| | | | | * README: There is an issue with the trust in the current working direcory when relative paths are used.
* Typo in README.Kaz Kylheku2022-07-251-1/+1
|
* Check using effective UID, not real.Kaz Kylheku2022-07-231-1/+1
| | | | | | | | | | | | | | | | | | | We don't want to behave like the access function, which is intended for use in setuid programs to determine what the original user can access. The purpose of safepath_check is to check whether the filesystem can harm the caller. For that, the effective identity that is being wielded should be used. A setuid executable might have a real user ID bob, but effective root. Root does not trust bob; root doesn't want to follow a symlink controlled by bob. * safepath.c (safe_group, tamper_proof): Replace getuid calls with geteuid. * README.md: Updated text.
* safepath: new project.Kaz Kylheku2022-07-221-0/+61