It is reported that NetBSD is susceptible to multiple unspecified local vulnerabilities in its binary compatibility layer. It is reported that many, if not all of the compatibility types are affected by these vulnerabilities. The system call translation functions reportedly execute unsafe operations with the user-supplied system call arguments. This BID will be updated as further information is disclosed, and as further analysis is performed. These vulnerabilities affect computers running NetBSD that have any 'COMPAT_*' options defined in the running kernel. These vulnerabilities allow local users to crash the kernel, denying service to legitimate users. It is also conjectured that some of these issues may allow for code execution in kernel-space, leading to privilege escalation.
It is reported that NetBSD is susceptible to multiple unspecified local vulnerabilities in its binary compatibility layer. It is reported that many, if not all of the compatibility types are affected by these vulnerabilities. The system call translation functions reportedly execute unsafe operations with the user-supplied system call arguments. This BID will be updated as further information is disclosed, and as further analysis is performed. These vulnerabilities affect computers running NetBSD that have any 'COMPAT_*' options defined in the running kernel. These vulnerabilities allow local users to crash the kernel, denying service to legitimate users. It is also conjectured that some of these issues may allow for code execution in kernel-space, leading to privilege escalation.