Add details on ASLR and move to user space section

This commit is contained in:
Raja Grewal 2024-08-16 13:39:11 +10:00
parent a132980023
commit 84376d23fc
No known key found for this signature in database
GPG key ID: 92CA473C156B64C4
2 changed files with 11 additions and 9 deletions

View file

@ -45,8 +45,6 @@ space, user space, core dumps, and swap space.
certain kernel exploitation attempts. Optional - Force immediate reboot on the
occurrence of a kernel panic.
- Randomize the addresses (ASLR) for mmap base, stack, VDSO pages, and heap.
- Disable the use of legacy TIOCSTI operations which can be used to inject keypresses.
- Disable asynchronous I/O (when using Linux kernel >= 6.6) as `io_uring` has been
@ -63,6 +61,8 @@ space, user space, core dumps, and swap space.
- Disallow unintentional writes to files in world-writable directories unless
they are owned by the directory owner to mitigate some data spoofing attacks.
- Randomize the addresses (ASLR) for mmap base, stack, VDSO pages, and heap.
- Increase the maximum number of memory map areas a process is able to utilize.
- Disable core dump files and prevent their creation. If core dump files are