lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20031128130205.GA16549@gaesi.org> From: lbruno at gaesi.org (Luis Bruno) Subject: Attacks based on predictable process IDs?? Wojciech Purczynski wrote: > Your "current" linux doesn't seem to be stable yet ;) I haven't seen > pids wider than 15 bits on any production system :) /usr/include/asm/posix_types.h: typedef int __kernel_pid_t; /usr/include/linux/types.h: typedef __kernel_pid_t pid_t; The reason you don't see 32bit pids is described here: http://www.ussg.iu.edu/hypermail/linux/kernel/0001.2/0169.html -- Luis Bruno C8-H10-N4-O2-CH3-CH2-OH UTM 29T 629481 E 4511776 N Alt: 576m