Skip to content

Commit 631b84e

Browse files
Reduce size of embedded image
Signed-off-by: David A. Wheeler <[email protected]>
1 parent c7ecc4e commit 631b84e

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

secure_software_development_fundamentals.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1032,8 +1032,10 @@ Many other design principles have been proposed, based on problems that have hap
10321032

10331033
A *race condition* happens when a system’s correct behavior depends on the sequence of events, but there is no control over that sequence. Race conditions generally involve one or more processes or threads accessing a shared resource, but this multiple access has not been properly controlled.
10341034

1035-
![A blue racecar and a red racecar racing to the finish line in front of a futuristic city](openai/racecars.png)<br>
1035+
<p align="center">
1036+
<img src="openai/racecars.png" width="512" height="512" alt="A blue racecar and a red racecar racing to the finish line in front of a futuristic city"><br>
10361037
*Racecars* generated by [OpenAI's Dall-E-2](https://openai.com/dall-e-2/)
1038+
</span>
10371039

10381040
If there is no control at all, that is a defect, and it might even be a vulnerability. Many programs, to be secure, have to do two things: (1) determine if a request is authorized, and (2) if it is, act on that request. If it is possible for an attacker to change the situation between steps 1 and 2, then the program could correctly determine that it is authorized, but then allow a different action that was *not* authorized. This kind of security mistake is so common that it has a name, a *time of check - time of use* (TOCTOU) race condition.
10391041

0 commit comments

Comments
 (0)