NetBSD Problem Report #39935
From www@NetBSD.org Sun Nov 16 16:21:02 2008
Return-Path: <www@NetBSD.org>
Received: from mail.netbsd.org (mail.netbsd.org [204.152.190.11])
by narn.NetBSD.org (Postfix) with ESMTP id DA54063B8BD
for <gnats-bugs@gnats.netbsd.org>; Sun, 16 Nov 2008 16:21:02 +0000 (UTC)
Message-Id: <20081116162102.9A37463B874@narn.NetBSD.org>
Date: Sun, 16 Nov 2008 16:21:02 +0000 (UTC)
From: ad@netbsd.org
Reply-To: ad@netbsd.org
To: gnats-bugs@NetBSD.org
Subject: ksymsread can leak contents of kernel memory to userspace
X-Send-Pr-Version: www-1.0
>Number: 39935
>Category: kern
>Synopsis: ksymsread can leak contents of kernel memory to userspace
>Confidential: no
>Severity: serious
>Priority: high
>Responsible: kern-bug-people
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Sun Nov 16 16:25:01 +0000 2008
>Last-Modified: Wed May 29 01:10:00 +0000 2019
>Originator: Andrew Doran
>Release: 5.99.2
>Organization:
The NetBSD Project
>Environment:
n/a
>Description:
ksyms_modunload() preserves symbol tables if /dev/ksyms is open,
however it does not manage the symbol table memory.
>How-To-Repeat:
Code inspection.
>Fix:
Pass ownership of symbol table memory from subr_kobj to kern_ksyms
when ksyms_modload() is called.
>Audit-Trail:
From: coypu@sdf.org
To: gnats-bugs@netbsd.org
Cc:
Subject: Re: kern/39935: ksymsread can leak contents of kernel memory to
userspace
Date: Wed, 29 May 2019 01:09:04 +0000
Do we consider the new limitations on /dev/ksyms as sufficient?
(Contact us)
$NetBSD: query-full-pr,v 1.43 2018/01/16 07:36:43 maya Exp $
$NetBSD: gnats_config.sh,v 1.9 2014/08/02 14:16:04 spz Exp $
Copyright © 1994-2017
The NetBSD Foundation, Inc. ALL RIGHTS RESERVED.