tar: Security

1 
1 10.2 Security
1 =============
1 
1 In some cases 'tar' may be used in an adversarial situation, where an
1 untrusted user is attempting to gain information about or modify
1 otherwise-inaccessible files.  Dealing with untrusted data (that is,
1 data generated by an untrusted user) typically requires extra care,
1 because even the smallest mistake in the use of 'tar' is more likely to
1 be exploited by an adversary than by a race condition.
1 

Menu