• Timo Teräs's avatar
    do not extract files with malicious name · 997aa99e
    Timo Teräs authored
    the security implications are not as high as compared to regular
    tar/unzip archiver. this is because you are anyway trusting
    the package to install files anywhere in the filesystem.
    
    this serves rather as a sanity to check against errors in created
    package.
    997aa99e
Name
Last commit
Last update
..
Makefile Loading commit data...
add.c Loading commit data...
apk-static.c Loading commit data...
apk-test.c Loading commit data...
apk.c Loading commit data...
apk_applet.h Loading commit data...
apk_archive.h Loading commit data...
apk_blob.h Loading commit data...
apk_database.h Loading commit data...
apk_defines.h Loading commit data...
apk_hash.h Loading commit data...
apk_io.h Loading commit data...
apk_package.h Loading commit data...
apk_print.h Loading commit data...
apk_provider_data.h Loading commit data...
apk_solver.h Loading commit data...
apk_solver_data.h Loading commit data...
apk_version.h Loading commit data...
archive.c Loading commit data...
audit.c Loading commit data...
blob.c Loading commit data...
cache.c Loading commit data...
commit.c Loading commit data...
common.c Loading commit data...
database.c Loading commit data...
del.c Loading commit data...
dot.c Loading commit data...
fetch.c Loading commit data...
fix.c Loading commit data...
gunzip.c Loading commit data...
hash.c Loading commit data...
index.c Loading commit data...
info.c Loading commit data...
io.c Loading commit data...
lua-apk.c Loading commit data...
md5.h Loading commit data...
package.c Loading commit data...
policy.c Loading commit data...
print.c Loading commit data...
search.c Loading commit data...
solver.c Loading commit data...
template.c Loading commit data...
update.c Loading commit data...
upgrade.c Loading commit data...
url.c Loading commit data...
ver.c Loading commit data...
verify.c Loading commit data...
version.c Loading commit data...