Time-of-check to time-of-use: Difference between revisions

Content deleted Content added
Line 24:
Although this sequence of events requires precise timing, it is possible for an attacker to arrange such conditions without too much difficulty.
 
The implication is that the ''access'' system call, as it currently exists in Unix, should never be used except as the first step of a [[Test and Test-and-set]].
 
== References ==