[packages/kernel] - disable struct randomization, it's pointless for a distro kernel

Arkadiusz Miśkiewicz arekm at maven.pl
Wed Sep 6 09:30:40 CEST 2017


On Wednesday 06 of September 2017, Jan Rękorajski wrote:
> On Wed, 06 Sep 2017, Arkadiusz Miśkiewicz wrote:
> > On Tuesday 05 of September 2017, baggins wrote:
> > > commit aa2cca690b9ce623e4dac08b9563584530a0a489
> > > Author: Jan Rękorajski <baggins at pld-linux.org>
> > > Date:   Tue Sep 5 23:52:49 2017 +0200
> > > 
> > >     - disable struct randomization, it's pointless for a distro kernel
> > 
> > Not pointless - exploit needs to match specific pld kernel directly and
> > generic or other distro exploits won't work.
> 
> What is very easy to accomplish, because you have to expose random seed
> used during kernel build to be able to build external modules. 

Not for typical "attacker" or automated attacks.

> I'm not strongly opposed to the idea, but you need to make sure external
> modules will build/work

Where there any problems already?

> if you really want a slower and bigger kernel
> for slight increase in security.

How bigger and slower? It only changes order of struct members AFAIK.

-- 
Arkadiusz Miśkiewicz, arekm / ( maven.pl | pld-linux.org )


More information about the pld-devel-en mailing list