Deutsch English Français Italiano |
<87r0g41ofh.fsf@nosuchdomain.example.com> View for Bookmarking (what is this?) Look up another Usenet article |
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Keith Thompson <Keith.S.Thompson+u@gmail.com> Newsgroups: comp.lang.c Subject: Re: A Famous Security Bug Date: Wed, 20 Mar 2024 16:19:46 -0700 Organization: None to speak of Lines: 24 Message-ID: <87r0g41ofh.fsf@nosuchdomain.example.com> References: <bug-20240320191736@ram.dialup.fu-berlin.de> <utfdte$1lou1$1@dont-email.me> <utfmd6$1nv2m$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Injection-Info: dont-email.me; posting-host="0bf58c5e3e50115de10475b5e7b86fc1"; logging-data="1869328"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/4KCf8n/PgZ0qz3RblXh58" User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux) Cancel-Lock: sha1:7aTzL8ms29Vv/yGTXwIhpZJBHts= sha1:Rd7e1G5oMjJ/J+jp647FoJTlZlg= "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> writes: > On 3/20/2024 12:37 PM, Chris M. Thomasson wrote: >> On 3/20/2024 11:18 AM, Stefan Ram wrote: >>> A "famous security bug": >>> >>> void f( void ) >>> { char buffer[ MAX ]; >>> /* . . . */ >>> memset( buffer, 0, sizeof( buffer )); } >>> >>> . Can you see what the bug is? >>> >>> (I have already read the answer; I post it as a pastime.) >> Add in a volatile? ;^) > > Instead of zeroing, what about filling it with random bytes reaped > from a TRNG? Why? -- Keith Thompson (The_Other_Keith) Keith.S.Thompson+u@gmail.com Working, but not speaking, for Medtronic void Void(void) { Void(); } /* The recursive call of the void */