summaryrefslogtreecommitdiff
path: root/HACKING
diff options
context:
space:
mode:
authorColin Walters <walters@verbum.org>2015-09-23 14:07:21 -0400
committerColin Walters <walters@verbum.org>2015-09-24 11:10:36 -0400
commit98bb6c91b710a95efe4cfeb303daeec3381b9c98 (patch)
treecafda36fc8bb8a753103a9e0dcb9864a15e65f9f /HACKING
parent6d0d9938e34df351615d644ea3d2fc667fa6a22f (diff)
downloadgobject-introspection-98bb6c91b710a95efe4cfeb303daeec3381b9c98.tar.gz
libgirepository: Refuse to run in setuid applications
We know of at least one privilege escalation path via `GI_TYPELIB_PATH`. I don't want to audit for others. If someone shows up with a use case we can talk. https://bugzilla.gnome.org/show_bug.cgi?id=755472
Diffstat (limited to 'HACKING')
0 files changed, 0 insertions, 0 deletions