1 |
On 27 Jan 2012 at 16:25, Kevin Chadwick wrote: |
2 |
|
3 |
> Thanks for the info. In a discussion about malloc flags, it was |
4 |
> mentioned on the OpenBSD list that clearing the memory |
5 |
> immediately brought little in security as it would be cleared before |
6 |
> re-use and if anything could increase the chances of an attacker |
7 |
> writing to areas that he wanted to. |
8 |
|
9 |
the SANITIZE feature of PaX doesn't clear userland memory, it clears kernel pages |
10 |
when they're freed back to the lowest level kernel memory allocator. it is meant |
11 |
to reduce the amount of information that can be leaked by kernel bugs from kernel |
12 |
space to userland. if these pages were cleared on allocation only (as is the case |
13 |
without SANITIZE) then they'd be subject to said infoleaking bugs while sitting |
14 |
on the free page list. |
15 |
|
16 |
also as an optimization these early-cleared pages are not cleared again when the kernel |
17 |
metes them out to the next user. |
18 |
|
19 |
> > Core2Duo |
20 |
> |
21 |
> I don't know the details but according to OpenBSDs Theo, the Core2Duo |
22 |
> had some major design flaws that intel couldn't fix with microcode with |
23 |
> some security implications. |
24 |
|
25 |
yeah, Theo for president! of the lunatic asylum. |