safe-rm Changelog

What's new in safe-rm 0.10

Jun 10, 2013
  • This minor release adds IFS to the list of environment variables to untaint.

New in safe-rm 0.9 (Jan 12, 2013)

  • This release adds /lib32 and /lib64 to the default list of protected paths.

New in safe-rm 0.8 (Oct 15, 2009)

  • This new version removes an unnecessary dependency on the English Perl module.
  • This makes safe-rm more robust during upgrades of the Perl core packages.

New in safe-rm 0.7 (Sep 23, 2009)

  • Version 0.7 of safe-rm fixes a small untainting problem for people who have CDPATH defined in their environment. Others can safely skip this release and stick to version 0.6.

New in safe-rm 0.6 (May 22, 2009)

  • The new release of safe-rm, version 0.6, fixes a bug which caused symbolic links to protected files to be undeletable. Therefore if you create a symlink to /usr/lib, you will now be able to delete it without having to use the real rm explicitly.
  • You can still use safe-rm to protect regular files and directories from accidental deletion using the rm command, but symbolic links will no longer be protected.
  • Another minor enhancement included in this release is the change in the message displayed by safe-rm when a protected file is skipped. The new message should now make it explicit who is to blame when a file isn't being deleted.

New in safe-rm 0.5 (Apr 2, 2009)

  • In addition to protecting specific files and directories from accidental deletion, this release of safe-rm introduces support for wildcards in protected paths.
  • Minor improvements were also made to the documentation and overall code quality.

New in safe-rm 0.4 (Nov 1, 2008)

  • The main change in this release is a fix for a bug that was preventing the root directory from being added to the list of protected paths.
  • Safe-rm is now able to protect you from the infamous "rm -rf /".

New in safe-rm 0.3 (Sep 9, 2008)

  • This release fixes a bug which caused safe-rm to skip the full blacklist checks when dealing with certain files and directories in the working directory.
  • Previously, unless the argument you passed to safe-rm contained a slash, it would not get the real (absolute) path of the file before checking against the blacklist.