diff options
author | unixsysadmin <36594929+unixsysadmin@users.noreply.github.com> | 2019-02-20 21:35:17 +0000 |
---|---|---|
committer | Lennart Poettering <lennart@poettering.net> | 2019-02-20 22:46:16 +0100 |
commit | 56ee4d7001a162a7a526a10482c3007a7115539f (patch) | |
tree | b4145a0fab326e8726d2b05174bdd04b2dc61204 /docs | |
parent | d3b8e06deeadae4fc17aa465757690840159aaaf (diff) | |
download | systemd-56ee4d7001a162a7a526a10482c3007a7115539f.tar.gz |
Fix typo - "do note use guessable names"
Fix typo - "do note use guessable names" to "do not use guessable names"
Diffstat (limited to 'docs')
-rw-r--r-- | docs/TEMPORARY_DIRECTORIES.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/docs/TEMPORARY_DIRECTORIES.md b/docs/TEMPORARY_DIRECTORIES.md index 6d67a1bc97..0ea88f8fc6 100644 --- a/docs/TEMPORARY_DIRECTORIES.md +++ b/docs/TEMPORARY_DIRECTORIES.md @@ -30,7 +30,7 @@ directory directly translate into a 🚨 Denial-of-Service (DoS) 🚨 vulnerabil or worse: if some software creates a file or directory `/tmp/foo` then any other software that wants to create the same file or directory `/tmp/foo` either will fail (as the file already exists) or might be tricked into using -untrusted files. Hence: do note use guessable names in `/tmp/` or `/var/tmp/` — +untrusted files. Hence: do not use guessable names in `/tmp/` or `/var/tmp/` — if you do you open yourself up to a local DoS exploit or worse. (You can get away with using guessable names, if you pre-create subdirectories below `/tmp/` for them, like X11 does with `/tmp/.X11-unix/` through `tmpfiles.d/` |