projects
/
kconfig-hardened-check.git
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
| inline |
side by side
(parent:
aa8a28b
)
Add the 'fs.protected_fifos' check
author
Alexander Popov
<alex.popov@linux.com>
Tue, 17 Oct 2023 16:19:06 +0000
(19:19 +0300)
committer
Alexander Popov
<alex.popov@linux.com>
Tue, 17 Oct 2023 16:19:06 +0000
(19:19 +0300)
kernel_hardening_checker/checks.py
patch
|
blob
|
history
diff --git
a/kernel_hardening_checker/checks.py
b/kernel_hardening_checker/checks.py
index 12c8afae979a7b0a3af8dbad6dfdfc6bdf680c0f..fe26f1cecfda3d1a75684f4b7557937fe21807ee 100644
(file)
--- a/
kernel_hardening_checker/checks.py
+++ b/
kernel_hardening_checker/checks.py
@@
-580,7
+580,6
@@
def normalize_cmdline_options(option, value):
# TODO: draft of security hardening sysctls:
# what about bpf_jit_enable?
# vm.mmap_min_addr has a good value
-# fs.protected_fifos=2
# fs.protected_regular=2
# fs.suid_dumpable=0
# kernel.modules_disabled=1
@@
-616,3
+615,4
@@
def add_sysctl_checks(l, arch):
l += [SysctlCheck('harden_userspace', 'kspp', 'fs.protected_symlinks', '1')]
l += [SysctlCheck('harden_userspace', 'kspp', 'fs.protected_hardlinks', '1')]
+ l += [SysctlCheck('harden_userspace', 'kspp', 'fs.protected_fifos', '2')]