Linux Security Mitigations
A look at three security features
Hanno Böck
https://hboeck.de/
Disclaimer: This touches areas with poor documentation that I only vaguely understand. Things may be wrong
Heap grows from below, Stack grows from above
If Stack grows too large they overlap
Enabled in Gentoo Hardened
Legacy feature mapping commonly used kernel functions into the application memory at fixed addresses
Replaced by VDSO, which is dynamically (and randomly) allocated
Most systems use vsyscall in a safer, emulated mode
It's deprecated, let's just disable it
CONFIG_LEGACY_VSYSCALL_NONE=y
Malicious devices connected to PCI, PCMCIA, Firewire
Full access to system memory via DMA bus
IOMMU allows separate address space for each device
CONFIG_INTEL_IOMMU=y
CONFIG_INTEL_IOMMU_DEFAULT_ON=y
Some reports about problems with Intel GPUs (intel_iommu=igfx_off)
Please help
- Test these features
- Ask your distributions why they aren't enabled by default