diff options
author | Colin Walters <walters@verbum.org> | 2015-09-23 14:07:21 -0400 |
---|---|---|
committer | Colin Walters <walters@verbum.org> | 2015-09-24 11:10:36 -0400 |
commit | 98bb6c91b710a95efe4cfeb303daeec3381b9c98 (patch) | |
tree | cafda36fc8bb8a753103a9e0dcb9864a15e65f9f /HACKING | |
parent | 6d0d9938e34df351615d644ea3d2fc667fa6a22f (diff) | |
download | gobject-introspection-98bb6c91b710a95efe4cfeb303daeec3381b9c98.tar.gz |
libgirepository: Refuse to run in setuid applications
We know of at least one privilege escalation path via
`GI_TYPELIB_PATH`. I don't want to audit for others. If someone
shows up with a use case we can talk.
https://bugzilla.gnome.org/show_bug.cgi?id=755472
Diffstat (limited to 'HACKING')
0 files changed, 0 insertions, 0 deletions