To clarify, it seems to be my "apt-get update" in my cron job that's
triggering this:

# apt-get update
Get:1 http://security.debian.org/debian-security bookworm-security/updates
InRelease [48.0 kB]
0% [Waiting for headers] [1 InRelease 0 B/48.0 kB 0%]
Message from syslogd@mini1 at Sep 11 00:39:43 ...
kernel:[   93.705712] usercopy: Kernel memory exposure attempt detected
from kmap (offset 0, size 16384)!
Hit:2 http://ftp.us.debian.org/debian bookworm InRelease
0% [1 InRelease 0 B/48.0 kB 0%]
Message from syslogd@mini1 at Sep 11 00:39:43 ...
kernel:[   94.007455] usercopy: Kernel memory exposure attempt detected
from kmap (offset 0, size 16384)!

Happening on PAE and non-PAE kernel.  Did not have this issue in bullseye
using linux-image-5.10.0-25-686-pae.

On Sun, Sep 10, 2023 at 4:57 PM Debian Bug Tracking System <
ow...@bugs.debian.org> wrote:

> Thank you for filing a new Bug report with Debian.
>
> You can follow progress on this Bug here: 1051643:
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051643.
>
> This is an automatically generated reply to let you know your message
> has been received.
>
> Your message is being forwarded to the package maintainers and other
> interested parties for their attention; they will reply in due course.
>
> As you requested using X-Debbugs-CC, your message was also forwarded to
>   sujiannm...@gmail.com
> (after having been given a Bug report number, if it did not have one).
>
> Your message has been sent to the package maintainer(s):
>  Debian Kernel Team <debian-ker...@lists.debian.org>
>
> If you wish to submit further information on this problem, please
> send it to 1051...@bugs.debian.org.
>
> Please do not send mail to ow...@bugs.debian.org unless you wish
> to report a problem with the Bug-tracking system.
>
> --
> 1051643: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051643
> Debian Bug Tracking System
> Contact ow...@bugs.debian.org with problems
>


-- 
Jiann-Ming Su

Reply via email to