projects
/
kconfig-hardened-check.git
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
| inline |
side by side
(parent:
75d090b
)
Add the 'fs.protected_hardlinks' check
author
Alexander Popov
<alex.popov@linux.com>
Tue, 17 Oct 2023 16:07:41 +0000
(19:07 +0300)
committer
Alexander Popov
<alex.popov@linux.com>
Tue, 17 Oct 2023 16:07:41 +0000
(19:07 +0300)
kernel_hardening_checker/checks.py
patch
|
blob
|
history
diff --git
a/kernel_hardening_checker/checks.py
b/kernel_hardening_checker/checks.py
index cb509089129a61e50c45615de8f7b1bb9ba27da6..12c8afae979a7b0a3af8dbad6dfdfc6bdf680c0f 100644
(file)
--- a/
kernel_hardening_checker/checks.py
+++ b/
kernel_hardening_checker/checks.py
@@
-580,7
+580,6
@@
def normalize_cmdline_options(option, value):
# TODO: draft of security hardening sysctls:
# what about bpf_jit_enable?
# vm.mmap_min_addr has a good value
-# fs.protected_hardlinks=1
# fs.protected_fifos=2
# fs.protected_regular=2
# fs.suid_dumpable=0
@@
-616,3
+615,4
@@
def add_sysctl_checks(l, arch):
# and since v5.11 it enables unprivileged userfaultfd for user-mode only.
l += [SysctlCheck('harden_userspace', 'kspp', 'fs.protected_symlinks', '1')]
+ l += [SysctlCheck('harden_userspace', 'kspp', 'fs.protected_hardlinks', '1')]