Date: Wed, 17 Nov 1999 16:07:14 -0500 (EST) From: Brian Fundakowski Feldman <green@FreeBSD.org> To: Matthew Dillon <dillon@apollo.backplane.com> Cc: Kelly Yancey <kbyanc@posi.net>, freebsd-security@FreeBSD.ORG Subject: Re: kernel stack contents visible from userland Message-ID: <Pine.BSF.4.10.9911171605080.72917-100000@green.myip.org> In-Reply-To: <199911171727.JAA64140@apollo.backplane.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> Since the kernel stack is per-process, I don't think there is any > security concern. But you've definitely uncovered an undesired > trait so I think your patch is a good one. > > -Matt > Matthew Dillon > <dillon@backplane.com> I'd be more inclined to, in any case, zero the memory. If you return a struct, you should be able to know exactly whether or not X data-field is valid. You can't do this if parts contain "random" memory. -- Brian Fundakowski Feldman \ FreeBSD: The Power to Serve! / green@FreeBSD.org `------------------------------' To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9911171605080.72917-100000>