in reply to Re^2: Unique filehandle -- what is correct?
in thread Unique filehandle -- what is correct?
Yeah. And the PID can easily been guessed or searched for by an attacker. Using the PID as template for temporary file names is a classic way to open a program for security exploits.
Alexander
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^4: Unique filehandle -- what is correct?
by JavaFan (Canon) on Dec 12, 2011 at 12:11 UTC |