Time-of-check to time-of-use: Difference between revisions

Content deleted Content added
''access'' Example: access still has utility in other circumstances
revert - I was incorrect
Line 24:
Although this sequence of events requires precise timing, it is possible for an attacker to arrange such conditions without too much difficulty.
 
The implication is that the ''access'' system call, as it currently exists in Unix, should never be used to check if file access should continue.
 
== References ==