Edge stores passwords in plaintext memory at startup; a tool has been released to test against the flaw.

    • Kogasa@programming.dev
      link
      fedilink
      English
      arrow-up
      16
      ·
      edit-2
      11 days ago

      Seems like a pretty basic security precaution to avoid loading decrypted secrets into memory before they’re needed. Someone who can access application memory can already own you but there isn’t really a good reason why they should be able to access secrets that you never accessed while they were in.

      I wouldn’t say it’s an alarming flaw, just seems weirdly and unnecessarily unsafe

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        2
        ·
        11 days ago

        At some point they will need to be decrypted anyway

        I think this was done for performance and simplicity

        • Kogasa@programming.dev
          link
          fedilink
          English
          arrow-up
          2
          ·
          11 days ago

          Yep, and at that point they will be in memory until a reasonable time to clean up. But decrypting the whole password database and leaving it there forever seems needlessly unsafe.

  • ejs@piefed.social
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    11 days ago

    TIL: If you cat /proc/sys/kernel/yama/ptrace_scope on your linux distro:

    • 0: All processes with same UID can read each other’s memory
    • 1: Restricted (Only parents can read children)
    • 2: Admin only (Requires sudo).

    Most distros have this set to 1 by default.

    More details: man 2 ptrace, search using /: scope