NetBSD Problem Report #39935

From www@NetBSD.org  Sun Nov 16 16:21:02 2008
Return-Path: <www@NetBSD.org>
Received: from mail.netbsd.org (mail.netbsd.org [204.152.190.11])
	by narn.NetBSD.org (Postfix) with ESMTP id DA54063B8BD
	for <gnats-bugs@gnats.netbsd.org>; Sun, 16 Nov 2008 16:21:02 +0000 (UTC)
Message-Id: <20081116162102.9A37463B874@narn.NetBSD.org>
Date: Sun, 16 Nov 2008 16:21:02 +0000 (UTC)
From: ad@netbsd.org
Reply-To: ad@netbsd.org
To: gnats-bugs@NetBSD.org
Subject: ksymsread can leak contents of kernel memory to userspace
X-Send-Pr-Version: www-1.0

>Number:         39935
>Category:       kern
>Synopsis:       ksymsread can leak contents of kernel memory to userspace
>Confidential:   no
>Severity:       serious
>Priority:       high
>Responsible:    kern-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Sun Nov 16 16:25:01 +0000 2008
>Last-Modified:  Wed May 29 01:10:00 +0000 2019
>Originator:     Andrew Doran
>Release:        5.99.2
>Organization:
The NetBSD Project
>Environment:
n/a
>Description:
ksyms_modunload() preserves symbol tables if /dev/ksyms is open,
however it does not manage the symbol table memory.

>How-To-Repeat:
Code inspection.
>Fix:
Pass ownership of symbol table memory from subr_kobj to kern_ksyms
when ksyms_modload() is called.

>Audit-Trail:
From: coypu@sdf.org
To: gnats-bugs@netbsd.org
Cc: 
Subject: Re: kern/39935: ksymsread can leak contents of kernel memory to
 userspace
Date: Wed, 29 May 2019 01:09:04 +0000

 Do we consider the new limitations on /dev/ksyms as sufficient?

NetBSD Home
NetBSD PR Database Search

(Contact us) $NetBSD: query-full-pr,v 1.43 2018/01/16 07:36:43 maya Exp $
$NetBSD: gnats_config.sh,v 1.9 2014/08/02 14:16:04 spz Exp $
Copyright © 1994-2017 The NetBSD Foundation, Inc. ALL RIGHTS RESERVED.