Chris Evans <chris@ferret.lmh.ox.ac.uk> writes:
> A 32 bit pid_t is more interesting (and plausible). Assuming a _signed_
> pid_t, a rather high rate of 1000 exploit attempts/second, and a 100% race
> success when the right pid is guessed
>
> .. you take on average 11.5 days to exploit. At 100% CPU. That's not going
> to go unnoticed.
... maybe. I don't know if 30 days at 30% CPU or 30 days * 8 hrs * 100% CPU
would be detected or not.
OTOH chances are you'll get it after a day - I don't like the idea
of having 90% probability that no one exploits some known race on my
system this week.
-- Krzysztof Halasa Network Administrator- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Sun Jan 23 2000 - 21:00:13 EST