Closed vt-alt closed 2 years ago
You're right, this is incorrect as is, given for example https://stackoverflow.com/questions/6004816/kernel-zeroes-memory (HT @diagprov). Do you have a proposal of a better wording?
I need to re-read to see if we have covered elsewhere, but I would propose something like this:
On most modern operating systems, allocators do not always ask the kernel to free previously allocated memory, but make it available for reuse by the application at a later stage. If the memory contains secret keys that have not been cleared, these will remain available to read for longer than intended. The increased exposure can cause previously harmless vulnerabilities to expose secret material. On older or embedded systems, memory may not be cleared across 'process' boundaries leading to leaks of memory between these processes.
Wording I made up just now, can probably be improved.
I'll look into exactly what happens on Linux and Windows and make a PR unless someone beats me to it :) I did promise I'd do some maintenance work on this...
I think process memory can be unintentionally accessed by another process when — process is crashed and core dumped (by accessing the core
file), process memory is swapped (by accessing swap partition), by exploiting a kernel bug or a bug in the process itself; or by some legitimate methods — such as process tracing[1].
ps. [1] ...or other debugging facilities. Also, hardware methods such as access via FireWire port, cold boot attack, memory freezing, etc.
Please go ahead and start a PR, better if it comes with links/references to back the claims.
On Fri, Jan 7, 2022 at 7:06 PM Vitalio @.***> wrote:
I think process memory can be unintentionally accessed by another process when — process is crashed and core dumped (by accessing the core file), process memory is swapped (by accessing swap partition), by exploiting a kernel bug or a bug in the process itself; or by some legitimate methods — such as process tracing.
— Reply to this email directly, view it on GitHub https://github.com/veorq/cryptocoding/issues/23#issuecomment-1007619066, or unsubscribe https://github.com/notifications/unsubscribe-auth/AAYONSTU2YBR4N4QWKPL773UU4TSLANCNFSM5LMWVIFQ . Triage notifications on the go with GitHub Mobile for iOS https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675 or Android https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub.
You are receiving this because you commented.Message ID: @.***>
Because PR #24 was accepted I close this issue.
This looks like incorrect statement:
This is certainly not true for Linux and I bet for most other systems too.