Content deleted Content added
→access Example: tatas |
|||
Line 24:
Although this sequence of events requires precise timing, it is possible for an attacker to arrange such conditions without too much difficulty.
The implication is that the ''access'' system call, as it currently exists in Unix, should never be used except as the first step of a [[Test and Test-and-set]].
== References ==
|