X-Git-Url: https://jxself.org/git/?a=blobdiff_plain;f=README.md;h=2780cf3a54a55dacca436c053807ff0e57e71b9f;hb=refs%2Ftags%2Fv0.5.3;hp=978c660930894972a2613e0c126b158d4ebd3e37;hpb=2766d5db2254217f4ddf11255706277808fef9bf;p=kconfig-hardened-check.git diff --git a/README.md b/README.md index 978c660..2780cf3 100644 --- a/README.md +++ b/README.md @@ -15,7 +15,9 @@ against my hardening preferences, which are based on the - [CLIP OS kernel configuration][2], - last public [grsecurity][3] patch (options which they disable). -Please don't cry if my Python code looks like C. I'm just a kernel developer. +I also created [__Linux Kernel Defence Map__][4] that is a graphical representation of the +relationships between these hardening features and the corresponding vulnerability classes +or exploitation techniques. ## Supported microarchitectures @@ -187,7 +189,7 @@ So the version of `kconfig-hardened-check` is associated with the corresponding The version format is: __[major_number].[kernel_version]__ -The current version of `kconfig-hardened-check` is __0.5.2__, it's marked with the git tag. +The current version of `kconfig-hardened-check` is __0.5.3__, it's marked with the git tag. ## Questions and answers @@ -214,3 +216,4 @@ try to install `gcc-7-plugin-dev` package, it should help. [1]: http://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings [2]: https://docs.clip-os.org/clipos/kernel.html#configuration [3]: https://grsecurity.net/ +[4]: https://github.com/a13xp0p0v/linux-kernel-defence-map