Forums before death by AOL, social media and spammers... "We can't have nice things"
|    linux.debian.kernel    |    Debian kernel discussions    |    2,884 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 896 of 2,884    |
|    Aaron Rainbolt to All    |
|    Bug#1117568: Backport hash_pointers boot    |
|    08 Oct 25 05:20:01    |
      XPost: linux.debian.bugs.dist       From: arraybolt3@gmail.com              Source: linux       Version: 6.12.48-1       Severity: important       X-Debbugs-Cc: adrelanos@whonix.org, arraybolt3@gmail.com              One of the debugging options the kernel provide, `slab_debug`, is used       as a hardening mechanism by multiple security-conscious Linux       distributions, namely Tails and Kicksecure, as it makes some forms of       memory management bugs more difficult to exploit. It is recommended by       the Kernel Self Protection Project for users who want to set up a       "particularly paranoid" system. (See       https://kspp.github.io/Recommended_Settings) Unfortunately, due to       upstream apparently previously considering this feature as only a       debugging feature, setting the kernel parameter `slab_debug=FZ` (or       similar) results in unhashed kernel addresses being exposed in areas       such as the kernel logs, making it easier to bypass KASLR when this       option is enabled. Users with high security requirements are therefore       left with a bit of a catch-22 - either enable `slab_debug` and hope       that making KASLR easy to bypass isn't going to ultimately be a       problem, or leave `slab_debug` disabled and live without the additional       memory safety benefits it provides.              Linux 6.17 introduced a new boot option, `hash_pointers`, which allows       one to configure whether pointer values exposed to userspace are hashed       or unhashed independently of the `slab_debug` setting. Users who are       interested in using `slab_debug` for hardening but don't need the       debugging capabilities it provides can thus boot with something like       `slab_debug=FZ hash_pointers=always`, giving the best of both worlds.       The patch that introduces this option can be seen at       https://github.com/torvalds/linux/commit/de1c831a7898f164c1c2703       6b2b9e4fb4bebefc       This patch indicates that the use of `slab_debug` as a hardening option       and not just a debugging option is explicitly supported by Linux, this       is not an abuse of the feature.              The additional boot option does virtually nothing functionally, it       simply allows setting this new combination of options that the kernel       didn't previously expose. At least to me, the patch appears small, safe,       and it arguably is a kind of bugfix even though technically it is       presented as a new feature.              I would like if the kernel team could consider backporting this patch       into Debian Trixie's stable kernel. Thank you.              -----BEGIN PGP SIGNATURE-----              iQIzBAEBCgAdFiEEudh48PFXwyPDa0wGpwkWDXPHkQkFAmjl18AACgkQpwkWDXPH       kQlNJRAA0n5p1SVMBJM1Hp8fXstR6IUl3EdKD5n21ctKV1pLjEvvED6Gumqm4tZE       ilmR+tmMhcT9vREt5umSYFunkdAKz2y/nJUfeLdo2R/EEBpzp3enCUok4QUQrTmo       VRaJAkNHu3kg9dkzKb3pSqWYI13WQdbXIbGVCABHHMO80c3/KxyWxAwCFYW6aRVg       Ebtb0OUCsCwwUCascH3t/ycPRWmhOcPg4s1I6SBPfkJ50M3U5rGfwIPP45P5wN9/       xEY9C11ozI4/VmeMYrjLECopg0pRNk8/z8M0Yvb+viuTlqVu9bO4CZZ/gcFoezkx       UoR8XBqe39nxYCPLMTZ+dTItJJ7LXbFa6o6xnDFex0b6RAS2qnAR/HSF2sLxY/pi       50Xv/FRsNoGRX1Mftfp9JaHg9H9uPX3eHISdYrvn57TYJeTqBqU6ZvyNewVhhYR0       AGYRlhSC1WbOanOvP0R0y1/K0Bd483NPYgPOkAPTPbTwJJDF/+640sUL2rmmbLnQ       c5aBDp9IsU3vDky9wYMQiiinVk1YJmdoXbEsmJHgy8rUMsr9FyNem11uknPCBDXH       FQBnBMqG2NxD4A/sovpM6ZrD/IAaZlQv6UiP7VNtpN7yLUdB3c9A/Tie0yhBhMVB       mcnjMmzkmZLfPX+kNIB7rDYfhp69LsEzQfeXysf7GYmT+OaWHuU=       =VdqL       -----END PGP SIGNATURE-----              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca