• Guido van Rossum's avatar
    The TemporaryFile() function has a security leak -- because the · dce3d550
    Guido van Rossum yazdı
    filenames generated are easily predictable, it is possible to trick an
    unsuspecting program into overwriting another file by creating a
    symbolic link with the predicted name.  Fix this by using the
    low-level os.open() function with the O_EXCL flag and mode 0700.  On
    non-Unix platforms, presumably there are no symbolic links so the
    problem doesn't exist.  The explicit test for Unix (posix, actually)
    makes it possible to change the non-Unix logic to work without a
    try-except clause.
    
    The mktemp() file is as unsafe as ever.
    dce3d550
Adı
Son kayıt (commit)
Son güncelleme
BeOS Loading commit data...
Demo Loading commit data...
Doc Loading commit data...
Grammar Loading commit data...
Include Loading commit data...
Lib Loading commit data...
Mac Loading commit data...
Misc Loading commit data...
Modules Loading commit data...
Objects Loading commit data...
PC Loading commit data...
PCbuild Loading commit data...
Parser Loading commit data...
Python Loading commit data...
Tools Loading commit data...
.hgtags Loading commit data...
Makefile.in Loading commit data...
README Loading commit data...
acconfig.h Loading commit data...
config.h.in Loading commit data...
configure Loading commit data...
configure.in Loading commit data...
install-sh Loading commit data...