projects
/
kconfig-hardened-check.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Update KSPP recommendations
[kconfig-hardened-check.git]
/
kconfig_hardened_check
/
config_files
/
kspp-recommendations
/
kspp-recommendations-x86-32.config
diff --git
a/kconfig_hardened_check/config_files/kspp-recommendations/kspp-recommendations-x86-32.config
b/kconfig_hardened_check/config_files/kspp-recommendations/kspp-recommendations-x86-32.config
index 477d75c1dd1608cdc313bb723986657518df10fd..edca82b7414ee94eaa7b3b4d73896d6c70343482 100644
(file)
--- a/
kconfig_hardened_check/config_files/kspp-recommendations/kspp-recommendations-x86-32.config
+++ b/
kconfig_hardened_check/config_files/kspp-recommendations/kspp-recommendations-x86-32.config
@@
-80,6
+80,9
@@
CONFIG_REFCOUNT_FULL=y
# Check for memory copies that might overflow a structure in str*() and mem*() functions both at build-time and run-time.
CONFIG_FORTIFY_SOURCE=y
# Check for memory copies that might overflow a structure in str*() and mem*() functions both at build-time and run-time.
CONFIG_FORTIFY_SOURCE=y
+# Avoid kernel memory address exposures via dmesg (sets sysctl kernel.dmesg_restrict initial value to 1)
+CONFIG_SECURITY_DMESG_RESTRICT=y
+
# Dangerous; enabling this allows direct physical memory writing.
# CONFIG_ACPI_CUSTOM_METHOD is not set
# Dangerous; enabling this allows direct physical memory writing.
# CONFIG_ACPI_CUSTOM_METHOD is not set
@@
-162,6
+165,9
@@
CONFIG_X86_PAE=y
# Disallow allocating the first 64k of memory.
CONFIG_DEFAULT_MMAP_MIN_ADDR=65536
# Disallow allocating the first 64k of memory.
CONFIG_DEFAULT_MMAP_MIN_ADDR=65536
+# Disable Model-Specific Register writes.
+# CONFIG_X86_MSR is not set
+
# Randomize position of kernel.
CONFIG_RANDOMIZE_BASE=y
# Randomize position of kernel.
CONFIG_RANDOMIZE_BASE=y