Gentoo Archives: gentoo-hardened

From: pageexec@××××××××.hu
To: gentoo-hardened@l.g.o
Subject: Re: [gentoo-hardened] Security Level: high/server/workstation/virtualization
Date: Fri, 27 Jan 2012 21:35:44
Message-Id: 4F231872.13156.2EA4FDE3@pageexec.freemail.hu
In Reply to: Re: [gentoo-hardened] Security Level: high/server/workstation/virtualization by Kevin Chadwick
1 On 27 Jan 2012 at 16:25, Kevin Chadwick wrote:
2
3 > Thanks for the info. In a discussion about malloc flags, it was
4 > mentioned on the OpenBSD list that clearing the memory
5 > immediately brought little in security as it would be cleared before
6 > re-use and if anything could increase the chances of an attacker
7 > writing to areas that he wanted to.
8
9 the SANITIZE feature of PaX doesn't clear userland memory, it clears kernel pages
10 when they're freed back to the lowest level kernel memory allocator. it is meant
11 to reduce the amount of information that can be leaked by kernel bugs from kernel
12 space to userland. if these pages were cleared on allocation only (as is the case
13 without SANITIZE) then they'd be subject to said infoleaking bugs while sitting
14 on the free page list.
15
16 also as an optimization these early-cleared pages are not cleared again when the kernel
17 metes them out to the next user.
18
19 > > Core2Duo
20 >
21 > I don't know the details but according to OpenBSDs Theo, the Core2Duo
22 > had some major design flaws that intel couldn't fix with microcode with
23 > some security implications.
24
25 yeah, Theo for president! of the lunatic asylum.

Replies

Subject Author
Re: [gentoo-hardened] Security Level: high/server/workstation/virtualization Kevin Chadwick <ma1l1ists@××××××××.uk>