To clarify, it seems to be my "apt-get update" in my cron job that's triggering this:
# apt-get update Get:1 http://security.debian.org/debian-security bookworm-security/updates InRelease [48.0 kB] 0% [Waiting for headers] [1 InRelease 0 B/48.0 kB 0%] Message from syslogd@mini1 at Sep 11 00:39:43 ... kernel:[ 93.705712] usercopy: Kernel memory exposure attempt detected from kmap (offset 0, size 16384)! Hit:2 http://ftp.us.debian.org/debian bookworm InRelease 0% [1 InRelease 0 B/48.0 kB 0%] Message from syslogd@mini1 at Sep 11 00:39:43 ... kernel:[ 94.007455] usercopy: Kernel memory exposure attempt detected from kmap (offset 0, size 16384)! Happening on PAE and non-PAE kernel. Did not have this issue in bullseye using linux-image-5.10.0-25-686-pae. On Sun, Sep 10, 2023 at 4:57 PM Debian Bug Tracking System < ow...@bugs.debian.org> wrote: > Thank you for filing a new Bug report with Debian. > > You can follow progress on this Bug here: 1051643: > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051643. > > This is an automatically generated reply to let you know your message > has been received. > > Your message is being forwarded to the package maintainers and other > interested parties for their attention; they will reply in due course. > > As you requested using X-Debbugs-CC, your message was also forwarded to > sujiannm...@gmail.com > (after having been given a Bug report number, if it did not have one). > > Your message has been sent to the package maintainer(s): > Debian Kernel Team <debian-ker...@lists.debian.org> > > If you wish to submit further information on this problem, please > send it to 1051...@bugs.debian.org. > > Please do not send mail to ow...@bugs.debian.org unless you wish > to report a problem with the Bug-tracking system. > > -- > 1051643: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051643 > Debian Bug Tracking System > Contact ow...@bugs.debian.org with problems > -- Jiann-Ming Su