freebsd-nq/sys/compat
David Schultz a3e1ec194d Bounds check the user-supplied length used in a copyout() in
svr4_do_getmsg().  In principle this bug could disclose data from
kernel memory, but in practice, the SVR4 emulation layer is probably
not functional enough to cause the relevant code path to be executed.
In any case, the emulator has been disconnected from the build since
5.0-RELEASE.

Found by:	Coverity Prevent analysis tool
2005-03-23 08:28:06 +00:00
..
freebsd32 Use kern_kevent instead of the stackgap for 32bit syscall wrapping. 2005-03-01 17:45:55 +00:00
ia32 o Split out kernel part of execve(2) syscall into two parts: one that 2005-01-29 23:12:00 +00:00
linprocfs Always produce cpuX entries, even in the case when there is only one CPU 2005-03-06 22:28:14 +00:00
linux Reject packets larger than IP_MAXPACKET in linux_sendto() for sockets 2005-03-23 08:28:00 +00:00
ndis s/SLIST/STAILQ/ 2005-03-18 11:57:44 +00:00
netbsd Start each of the license/copyright comments with /*- 2005-01-05 22:34:37 +00:00
pecoff remove dead code 2005-02-22 01:26:48 +00:00
svr4 Bounds check the user-supplied length used in a copyout() in 2005-03-23 08:28:06 +00:00