Ben Hutchings <b...@decadent.org.uk> writes:

> The test should be for non-random names *or* missing O_EXCL.  Use of an
> entirely predictable name with O_EXCL allows a DoS and use of a
> pseudo-random name without O_EXCL may still be exploitable for
> overwriting other files if the attacker can try repeatedly.

Sometimes there are no good options other than using O_EXCL with a
predictable name because the name is used as a rendezvous point.  This is
the case in some (non-default) configurations for Kerberos tickets, for
example.

But yes, it's not ideal.

-- 
Russ Allbery (r...@debian.org)               <http://www.eyrie.org/~eagle/>


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/87sjiiqaqa....@windlord.stanford.edu

Reply via email to