Re: PID sequences

Manuel J. Galan (nuke@bayside.net)
Fri, 27 Feb 1998 22:44:11 -0500 (EST)


On 27 Feb 1998, Miguel de Icaza wrote:

>
> > } In this specific case, the random PIDs will help make it harder to
> > } exploit a bunch of attacks on predictable filenames (all of our
> > } userland should be using mkstemp instead of mktemp eventually, just
> > } like OpenBSD).
> >
> > There _is_ no "our userland", unlike OpenBSD.
>
> Sure there is.
>
> Red Hat and Debian should audit the packages they ship, and ship with fixed
> bugs and security holes -just like OpenBSD has done-.

since when do redhat and debian not provide patched software? AFAIK,
slackware is the only one who doesn't.

> Fixes should be fed back to the package maintainers. I would expect
> this to be the next step in the evolution of the Linux distributions.

that step has already been taken.. do some research on www.debian.org and
www.redhat.com

_ _ __ __ _ _ _
| / |/ /_ __/ /_____ | Nuke Skyjumper |
| / / // / '_/ -_) | "Master of the Farce" |
|_ /_/|_/\_,_/_/\_\\__/ _|_ nuke@bayside.net _|

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu