-
Notifications
You must be signed in to change notification settings - Fork 908
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ASLR entropy is very low in mimalloc-secure #289
Comments
Ah that is unexpected; Did you run in debug mode? In that case ASLR is disabled for Line 474 in a9686d6
|
I tested this and I think you were running in debug mode. |
Hi. I think that would be nice if you mention this in the documentation. |
Hi @insuyun, Yes you are right; I'll add it to the documentation. Hmmm, on the other hand, maybe it is better to always enable ASLR in secure mode just to avoid this kind of surprise. |
We are working for the next version of ArcHeap to evaluate security of secure allocators. Thank you for your work! |
Thanks Insu -- I just pushed a commit to make ASLR to be always on in secure mode to avoid future security surprises. |
Ouch, looking at the commit I realized my logic was wrong -- it was already fixed! The test #if (MI_SECURE>0 || MI_DEBUG==0)
should always trigger in either secure or non-debug mode so it should already always do ASLR in secure mode even with debugging enabled. However, when I look back in the repo to 2020-08-09, it looks like it was already like this when the issue was raised so I wonder how that came about? Line 472 in 5805c39
|
Oh, I checked that my student said that he used older version. Best, |
The execution environment is ubuntu 18.04 latest.
When executing the code above, the heap memory range is quite predictable. It is, by 100% either one of 0x40000802000 - 0x40000917021 or 0x40000942000 - 0x40000a57021, so it may be prone to heap spray attacks. The main reason is because the base address is fixed to 0x40000000000.
The text was updated successfully, but these errors were encountered: