Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This program now successfully restricts access to files owned by the real user of the program, by matching the file owner's user and group IDs to the processes real user and group IDs. This solution can be used to verify that the owner of the file is the one the program expects, reducing opportunities for attackers to replace configuration files with malicious ones, for example.

...