Re: Malloc -Z
- From: RW <rwmaillists@xxxxxxxxxxxxxx>
- Date: Wed, 27 Jul 2011 20:02:06 +0100
On Wed, 27 Jul 2011 13:16:59 -0400
malloc(3) has never provided zeroed memory. If you need zeroed
memory in C, you either need to zero it yourself using memset(3),
or use calloc(3).
Or, in lieu, use -Z, presumably.
What would be prudent as a developer (and is the default in CURRENT
I believe) is to use J - it enforces the "memory from malloc(3) is
not guaranteed to be zeroed." by specifically setting it to
Hmm, well for debugging/fuzzing programs, Z or J could be useful.
As would new R(random), 5(0x55), a(0xaa), and f(0xff) variations.
But for security, it seems running with any of them set would be
wise or flat out required. No? As in the case where users are
untrusted (mischievous, but unable to gain root).
Because while your own shiny new program may zero on free, all
the other installed programs that handle 'sensitive' data may not.
And without using say, Z... any user could scrape the box. Right?
No. It's only freed memory from the same process that can be read.
Memory that's hung around in the heap long enough to to get reused.
Memory released from other processes is zeroed by the kernel before
it's mapped into the process's heap.
freebsd-security@xxxxxxxxxxx mailing list
To unsubscribe, send any mail to "freebsd-security-unsubscribe@xxxxxxxxxxx"
- Prev by Date: Re: Malloc -Z
- Next by Date: Re: Malloc -Z
- Previous by thread: Re: Malloc -Z
- Next by thread: Re: Malloc -Z