diff options
author | Sergey Bugaev <bugaevc@gmail.com> | 2023-04-29 16:13:52 +0300 |
---|---|---|
committer | Samuel Thibault <samuel.thibault@ens-lyon.org> | 2023-04-29 16:55:38 +0200 |
commit | 0e12519fe0567a6abcf6e2523102a768a520aef4 (patch) | |
tree | 289c8279eeecf64c2b94e4796fd8f692fe8b280f /shadow | |
parent | 41aac872341fbf70f3b7006ef266eb02a354a993 (diff) | |
download | glibc-0e12519fe0567a6abcf6e2523102a768a520aef4.tar.gz glibc-0e12519fe0567a6abcf6e2523102a768a520aef4.tar.xz glibc-0e12519fe0567a6abcf6e2523102a768a520aef4.zip |
hurd: Don't leak the auth port in msg* RPCs
The leak can be easily reproduced (and observed) using the portinfo tool: $ portinfo -v $$ | grep task 36: send task(1577)(self) (refs: 127) $ portinfo -v $$ | grep task 36: send task(1577)(self) (refs: 253) $ portinfo -v $$ | grep task 36: send task(1577)(self) (refs: 379) $ portinfo -v $$ | grep task 36: send task(1577)(self) (refs: 505) $ portinfo -v $$ | grep task 36: send task(1577)(self) (refs: 631) Checked on i686-gnu. Signed-off-by: Sergey Bugaev <bugaevc@gmail.com> Message-Id: <20230429131354.2507443-5-bugaevc@gmail.com>
Diffstat (limited to 'shadow')
0 files changed, 0 insertions, 0 deletions