Please describe exact testcases of the attacks you defend against.

(You can describe them in replies to this email, instead of resending
everything)

The code is going to be evolving in the future.
The future core readers need to understand
what needs to be avoided,

On Sat, Jan 31, 2026 at 3:06 PM Sertonix via busybox
<[email protected]> wrote:
>
>
> Also results in a binary size shrink by sharing more code :)
>
> Without this a process having write access to a directory could trick
> a more privilidged rm -r call to delete any file that the rm process
> has access to.
> _______________________________________________
> busybox mailing list
> [email protected]
> https://lists.busybox.net/mailman/listinfo/busybox
_______________________________________________
busybox mailing list
[email protected]
https://lists.busybox.net/mailman/listinfo/busybox

Reply via email to