setuid safeness - ensure if an app that is setuid doesn't do bad things
authorCarsten Haitzler (Rasterman) <raster@rasterman.com>
Wed, 8 Jan 2014 11:32:27 +0000 (20:32 +0900)
committerCarsten Haitzler (Rasterman) <raster@rasterman.com>
Wed, 8 Jan 2014 11:33:09 +0000 (20:33 +0900)
commit501b1cd5fcef6ebcf3151eeed5412e81304147af
treea5c93d05095c290ad410c03bc66875230151c304
parent2e34bf2633fea87c24f674c87f66865b90043627
setuid safeness - ensure if an app that is setuid doesn't do bad things

this makes efl ignore certain env vars for thnigs and entirely removes
user modules (that no one ever used) etc. etc. to ensure that *IF* an
app is setuid, there isn't a priv escalation path that is easy.
src/lib/elm_cnp.c
src/lib/elm_config.c
src/lib/elm_conform.c
src/lib/elm_module.c
src/lib/elm_url.c