Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 02 Oct 2009 23:10:50 +0200
From:      Pieter de Boer <pieter@thedarkside.nl>
To:        Jon Passki <jon@passki.us>
Cc:        FreeBSD-Security <freebsd-security@freebsd.org>
Subject:   Re: Fwd: FreeBSD Security Advisory FreeBSD-SA-09:13.pipe
Message-ID:  <4AC66C5A.3020301@thedarkside.nl>
In-Reply-To: <1B399692-1D5A-49C3-BDE7-7FAAA9C63910@passki.us>
References:  <1B399692-1D5A-49C3-BDE7-7FAAA9C63910@passki.us>

next in thread | previous in thread | raw e-mail | index | archive | help
Jon Passki wrote:
> Has the FreeBSD Secteam tested setting VM_MIN_ADDRESS to some high
> number such as 65536? This does not fix the vulnerability per se, but
> one would hope it stops a user mapping code to 0x0.
> 
See the FreeBSD-EN-09:05.null erratum that contains a patch that allows
you to do this with a sysctl :)

-- 
Pieter



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4AC66C5A.3020301>