summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorunixsysadmin <36594929+unixsysadmin@users.noreply.github.com>2019-02-20 21:35:17 +0000
committerLennart Poettering <lennart@poettering.net>2019-02-20 22:46:16 +0100
commit56ee4d7001a162a7a526a10482c3007a7115539f (patch)
treeb4145a0fab326e8726d2b05174bdd04b2dc61204 /docs
parentd3b8e06deeadae4fc17aa465757690840159aaaf (diff)
downloadsystemd-56ee4d7001a162a7a526a10482c3007a7115539f.tar.gz
Fix typo - "do note use guessable names"
Fix typo - "do note use guessable names" to "do not use guessable names"
Diffstat (limited to 'docs')
-rw-r--r--docs/TEMPORARY_DIRECTORIES.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/docs/TEMPORARY_DIRECTORIES.md b/docs/TEMPORARY_DIRECTORIES.md
index 6d67a1bc97..0ea88f8fc6 100644
--- a/docs/TEMPORARY_DIRECTORIES.md
+++ b/docs/TEMPORARY_DIRECTORIES.md
@@ -30,7 +30,7 @@ directory directly translate into a 🚨 Denial-of-Service (DoS) 🚨 vulnerabil
or worse: if some software creates a file or directory `/tmp/foo` then any
other software that wants to create the same file or directory `/tmp/foo`
either will fail (as the file already exists) or might be tricked into using
-untrusted files. Hence: do note use guessable names in `/tmp/` or `/var/tmp/` —
+untrusted files. Hence: do not use guessable names in `/tmp/` or `/var/tmp/` —
if you do you open yourself up to a local DoS exploit or worse. (You can get
away with using guessable names, if you pre-create subdirectories below `/tmp/`
for them, like X11 does with `/tmp/.X11-unix/` through `tmpfiles.d/`