If the hash random seed isn't changed on forking, then conceivably a privileged daemon could fork off child process which drop their privileges or run as a different user account. A core dump file from one of those children could be used to extract the random seed and attack the parent. But this probably isn't worth worrying about, since if you have the core dump you probably have all sorts of garbage data from the parent process, which is already an information leak at the least. -- Ed Avis <eda@waniasset.com>Thread Previous | Thread Next