Update README.md

This commit is contained in:
Raja Grewal 2022-07-13 22:25:53 +10:00
parent 4e93b4d37e
commit 2b237039cf
No known key found for this signature in database
GPG Key ID: E34A5801947020A5

View File

@ -40,6 +40,8 @@ arbitrary code execution in kernel mode.
* The bits of entropy used for mmap ASLR are increased, therefore improving * The bits of entropy used for mmap ASLR are increased, therefore improving
its effectiveness. its effectiveness.
* Randomises the addresses for mmap base, heap, stack, and VDSO pages.
* Prevents unintentional writes to attacker-controlled files. * Prevents unintentional writes to attacker-controlled files.
* Prevents common symlink and hardlink TOCTOU races. * Prevents common symlink and hardlink TOCTOU races.
@ -54,19 +56,13 @@ prevents writing potentially sensitive contents of memory to disk.
### Boot parameters ### Boot parameters
Boot parameters are configured via the `/etc/modprobe.d/30_security-misc.conf` Boot parameters are outlined in configuration files located in the
configuration file. `etc/default/grub.d/` directory.
* Slab merging is disabled which significantly increases the difficulty of * Slab merging is disabled which significantly increases the difficulty of
heap exploitation by preventing overwriting objects from merged caches and heap exploitation by preventing overwriting objects from merged caches and
by making it harder to influence slab cache layout. by making it harder to influence slab cache layout.
* Sanity checks are enabled which add various checks to prevent corruption
in certain slab operations.
* Redzoning is enabled which adds extra areas around slabs that detect when
a slab is overwritten past its real size which can help detect overflows.
* Memory zeroing at allocation and free time is enabled to mitigate some * Memory zeroing at allocation and free time is enabled to mitigate some
use-after-free vulnerabilities and erase sensitive information in memory. use-after-free vulnerabilities and erase sensitive information in memory.
@ -83,10 +79,15 @@ are a potential target for ROP.
* The kernel panics on oopses to thwart certain kernel exploits. * The kernel panics on oopses to thwart certain kernel exploits.
* Enables randomisation of the kernel stack offset on syscall entries.
* All mitigations for known CPU vulnerabilities are enabled and SMT is * All mitigations for known CPU vulnerabilities are enabled and SMT is
disabled. disabled.
* IOMMU is enabled to prevent DMA attacks. * IOMMU is enabled to prevent DMA attacks along with strict enforcement of IOMMU
TLB invalidation so devices will never be able to access stale data contents.
* Distrust the 'randomly' generated CPU and bootloader seeds.
### Blacklisted kernel modules ### Blacklisted kernel modules