{{Header}} {{title|title= Security Research by {{project_name_short}} }} {{#seo: |description=Security research, audits, and vulnerability reports published by {{project_name_short}}. }} {{about_mininav}} {{intro| This page tracks security research and vulnerability reports contributed by {{project_name_short}}, including links to upstream bug reports and internal research notes. }} = Security Vulnerability Bug Reports = {{IntroLike| Security issue reports filed at other projects. }} Related: [[Vulnerability_Disclosure_Policy|{{project_name_short}} Vulnerability Disclosure Policy]] == Public == {{IntroLike| Already published security bug reports. }} * [https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108288 Local privilege escalation via zuluPolkit, caused by Debian patch] == Pending publication == {{IntroLike| Security bug reports pending publication due to responsible disclosure. }} * upstream A ** bug A *** initial report date: 2026-02-01 *** intended publication date: 2026-05-03 *** no patch yet * upstream B ** bug A *** initial report date: 2026-01-30 *** intended publication date: 2026-05-01 *** public patch available, pending security advisory * upstream C ** bug A *** initial report date: 2025-12-23 *** intended publication date: 2026-03-24 *** no patch yet *** upstream notified of disclosure date * upstream D ** bug A *** initial report date: 2026-02-25 *** intended publication date: 2026-05-27 *** no patch yet * upstream E ** bug A *** initial report date: 2026-03-20 *** intended publication date: 2026-06-19 *** no patch yet = Security Research = {{IntroLike| Practical defensive security research: hardening work, threat modeling, and attack surface analysis. Synthesis of Linux distribution maintainer oriented decision making, security engineering, and [[Dev/maintainability|maintainability]] considerations. }} {| class="wikitable" |+ Security research overview |- ! Page ! Short summary ! Type |- | [[Dev/Strong_Linux_User_Account_Isolation|Strong Linux User Account Isolation]] | Overview of Linux user and root separation, attack vectors, and default and optional hardening measures. | Research |- | [[Verified_Boot|Verified Boot]] | Explains verified boot and chain of trust goals, advantages, limitations, and implementation considerations. | Research |- | [[ram-wipe]] / [[Dev/RAM_Wipe|Dev/RAM Wipe]] | Research and implementation of a dracut module that wipes RAM on shutdown. | Research |- | [[Dev/Entropy|Entropy]] | Technical discussion of entropy sources and randomness topics. | Research |- | [[Dev/remount-secure|remount-secure]] | Hardening proposal for secure mount options and a maintainable way for a distribution to apply them. | Research |- | [[Dev/compiler_hardening|Compiler Hardening]] | Overview of compiler hardening flags and link time options for GCC and Clang, focusing on exploit mitigation and diagnostics. | Notepad |- | [[Dev/About_Computer_(In)Security|About Computer (In)Security]] | Broad background notes and examples about computer insecurity and related concepts. | Essay |- | [[Trust|Trusting Kicksecure]] | Trust model discussion (backdoors, signatures, image verification) and how to place trust in the supply chain. | Essay |- | [[Dev/Secure_Boot|Secure Boot]] | Critical discussion of Secure Boot design tradeoffs, threat model, and limitations for user controlled trust currently on Intel/AMD64. | Summary |- | [[Dev/Stateless|Factory Reset, Stateless Systems, Anti-Hysteresis]] | Discussion of stateless and anti-hysteresis systems, upgrades and rollback risks, and links to related immutable approaches. | Notepad |- | [[Dev/apt-revoker|apt-revoker]] | Proposal for tooling to revoke compromised APT signing keys. | Design |- | [[Dev/Stable_vs_Rolling_Distributions|Stable vs Rolling Distributions - Security Analysis]] | Security analysis of stable and rolling release models. | Analysis |- | [[Dev/Permanent_Takedown_Attack_Defender|Permanent Takedown Attack Defender]] | Proposal to keep project metadata and update communication resilient against takedown, rollback, and freeze attacks, with Tor and signature considerations. | Design |- | [[Dev/confidential_computing|Confidential Computing]] | Survey and threat model notes around encrypted RAM and remote attestation technologies for cloud and hardware trust. | Survey |- | [[Vm-app-manager|vm-app-manager]] | Proposal for a virtualization based application sandbox with reduced VM escape surface and user controllable isolation features. | Notepad |- |} Pages marked "Notepad" are security relevant working notes or drafts that likely need more structure or completion before being presented as finished security research. Pages marked "Essay" are mostly conceptual discussion. = Privacy and Anonymity Research = See {{whonix_wiki |wikipage=Dev/research |text=Whonix research }}. {{Footer}} [[Category:Development]]