Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 17 Nov 1999 16:07:14 -0500 (EST)
From:      Brian Fundakowski Feldman <green@FreeBSD.org>
To:        Matthew Dillon <dillon@apollo.backplane.com>
Cc:        Kelly Yancey <kbyanc@posi.net>, freebsd-security@FreeBSD.ORG
Subject:   Re: kernel stack contents visible from userland
Message-ID:  <Pine.BSF.4.10.9911171605080.72917-100000@green.myip.org>
In-Reply-To: <199911171727.JAA64140@apollo.backplane.com>

next in thread | previous in thread | raw e-mail | index | archive | help
>     Since the kernel stack is per-process, I don't think there is any 
>     security concern.  But you've definitely uncovered an undesired
>     trait so I think your patch is a good one.
> 
> 					-Matt
> 					Matthew Dillon 
> 					<dillon@backplane.com>

I'd be more inclined to, in any case, zero the memory.  If you return
a struct, you should be able to know exactly whether or not X data-field
is valid.  You can't do this if parts contain "random" memory.

-- 
 Brian Fundakowski Feldman           \  FreeBSD: The Power to Serve!  /
 green@FreeBSD.org                    `------------------------------'



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9911171605080.72917-100000>