Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Mon, 11 Nov 2002 07:38:41 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Mon, 11 Nov 2002 07:38:41 -0500 Received: from pc1-cwma1-5-cust42.swa.cable.ntl.com ([80.5.120.42]:31139 "EHLO irongate.swansea.linux.org.uk") by vger.kernel.org with ESMTP id ; Mon, 11 Nov 2002 07:38:40 -0500 Subject: RE: random PID patch From: Alan Cox To: "Heusden van, FJJ " "(Folkert)" Cc: Roy Sigurd Karlsbakk , Linux Kernel Development In-Reply-To: <11D18E6D1073547-1319@_rabobank.nl_> References: <11D18E6D1073547-1319@_rabobank.nl_> Content-Type: text/plain Content-Transfer-Encoding: 7bit X-Mailer: Ximian Evolution 1.0.8 (1.0.8-10) Date: 11 Nov 2002 13:10:03 +0000 Message-Id: <1037020203.2919.26.camel@irongate.swansea.linux.org.uk> Mime-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 782 Lines: 18 On Mon, 2002-11-11 at 10:12, Heusden van, FJJ (Folkert) wrote: > Sometimes, (well; frequently) programs that create temporary > files let the filename depend on their PID. A hacker could use > that knowledge. So if you know that the application that Still can if its random. The attacker can be the one who exec's the vulnerable app. The attacker can use dnotify > things it's not supposed to. Like forcing suid apps to create > a file in the startup-scripts dir. or something. Just use namespaces and give every login their own /tmp - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/