NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

kern/45142: bpf_filter() can leak kernel stack contents

>Number:         45142
>Category:       kern
>Synopsis:       bpf_filter() can leak kernel stack contents
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    kern-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Thu Jul 14 00:55:00 +0000 2011
>Originator:     Guy Harris
>Release:        Any
N/A (bug discovered by looking at the OpenBSD CVS repository)

That's Linux's BPF interpreter, but the same problem exists with the *BSD BPF 

A bit more work on *BSD, as, unlike Linux, *BSD doesn't let you slap a BPF 
filter on arbitrary sockets, but there's probably something you can cook up, 
based on Dan's program.
Do a bzero() or memset(..., 0, ...) to clear out mem before you start running 
the BPF program (but after you do the "if no filter, just return 0xffffffff" 

Home | Main Index | Thread Index | Old Index