Date: Fri, 02 Oct 2009 23:10:50 +0200 From: Pieter de Boer <pieter@thedarkside.nl> To: Jon Passki <jon@passki.us> Cc: FreeBSD-Security <freebsd-security@freebsd.org> Subject: Re: Fwd: FreeBSD Security Advisory FreeBSD-SA-09:13.pipe Message-ID: <4AC66C5A.3020301@thedarkside.nl> In-Reply-To: <1B399692-1D5A-49C3-BDE7-7FAAA9C63910@passki.us> References: <1B399692-1D5A-49C3-BDE7-7FAAA9C63910@passki.us>
next in thread | previous in thread | raw e-mail | index | archive | help
Jon Passki wrote: > Has the FreeBSD Secteam tested setting VM_MIN_ADDRESS to some high > number such as 65536? This does not fix the vulnerability per se, but > one would hope it stops a user mapping code to 0x0. > See the FreeBSD-EN-09:05.null erratum that contains a patch that allows you to do this with a sysctl :) -- Pieter
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4AC66C5A.3020301>