diff options
author | Sergey Bugaev <bugaevc@gmail.com> | 2023-04-29 16:13:52 +0300 |
---|---|---|
committer | Samuel Thibault <samuel.thibault@ens-lyon.org> | 2023-04-29 16:55:38 +0200 |
commit | 0e12519fe0567a6abcf6e2523102a768a520aef4 (patch) | |
tree | 289c8279eeecf64c2b94e4796fd8f692fe8b280f /crypt | |
parent | 41aac872341fbf70f3b7006ef266eb02a354a993 (diff) | |
download | glibc-0e12519fe0567a6abcf6e2523102a768a520aef4.zip glibc-0e12519fe0567a6abcf6e2523102a768a520aef4.tar.gz glibc-0e12519fe0567a6abcf6e2523102a768a520aef4.tar.bz2 |
hurd: Don't leak the auth port in msg* RPCs
The leak can be easily reproduced (and observed) using the portinfo
tool:
$ portinfo -v $$ | grep task
36: send task(1577)(self) (refs: 127)
$ portinfo -v $$ | grep task
36: send task(1577)(self) (refs: 253)
$ portinfo -v $$ | grep task
36: send task(1577)(self) (refs: 379)
$ portinfo -v $$ | grep task
36: send task(1577)(self) (refs: 505)
$ portinfo -v $$ | grep task
36: send task(1577)(self) (refs: 631)
Checked on i686-gnu.
Signed-off-by: Sergey Bugaev <bugaevc@gmail.com>
Message-Id: <20230429131354.2507443-5-bugaevc@gmail.com>
Diffstat (limited to 'crypt')
0 files changed, 0 insertions, 0 deletions