in a project I'm currently working on I use the access(2) call when going through a path for plugins to load. For each : delim on the path it does an access(2) to see if there is a file there, and then it uses dlopen(3) to open the file as a share object, and responds appropriatly to any errors it may recieve from the dlopen(3) call. I'd like to offer this as an example of a reasonable, and noninsecure usage of access (please correct me if I'm wrong). I'm not worried about if the file is created after the access call: I'm just using the access call to avoid having to do a dlopen() on every : delim in the path. Thoughts? -- Jordan DeLong [EMAIL PROTECTED]
- Security problems with access(2)? Bill Moran
- Re: Security problems with access(2)? Rick Bradley
- Re: Security problems with access(2)? Bill Moran
- Re: Security problems with access(2)? Alfred Perlstein
- Re: Security problems with access(2)? Warner Losh
- Re: Security problems with access(2)? Paul Herman
- Re: Security problems with access(2)? Robert Watson
- Re: Security problems with access(2)? Bill Moran
- Re: Security problems with access(2... Greg Black
- Re: Security problems with acce... Jordan DeLong
- Re: Security problems with ... Mike Smith
- Re: Security problems with ... Jordan DeLong
- Re: Security problems with ... Mike Smith
- Re: Security problems with acce... Bill Moran
- Re: Security problems with ... Mike Smith
- Re: Security problems with ... Bill Moran
- Re: Security problems with ... Greg Black
- Re: Security problems with acce... Robert Watson
- Re: Security problems with ... Greg Black
- Re: Security problems with ... David O'Brien
PGP signature
