Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 07 Jan 2002 22:26:33 -0600
From:      "Alan L. Cox" <alc@imimic.com>
To:        security@freebsd.org
Cc:        cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   Re: cvs commit: src/sys/kern kern_exec.c
Message-ID:  <3C3A74F9.146EED69@imimic.com>
References:  <200201080413.g084DL725267@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Alan Cox wrote:
> 
> alc         2002/01/07 20:13:21 PST
> 
>   Modified files:        (Branch: RELENG_4)
>     sys/kern             kern_exec.c
>   Log:
>   MFC
>    Call aio_proc_rundown() from exec_new_vmspace() to prevent a pending AIO
>    from modifying the new address space.  (This is the one-line version
>    of the patch that is a part of Revision 1.147.)
> 
>   Reviewed by:    tegge
>   Approved by:    re
> 
>   Revision    Changes    Path
>   1.107.2.12  +6 -0      src/sys/kern/kern_exec.c

Also, this closes the exploit documented at

http://elysium.soniq.net/dr/tao/advisory.txt

Regards,
Alan

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3C3A74F9.146EED69>