mirror of
https://github.com/vincentmli/bpfire.git
synced 2026-04-27 19:23:24 +02:00
sysctl.conf: prevent autoloading of TTY line disciplines
Malicious/vulnerable TTY line disciplines have been subject of some kernel exploits such as CVE-2017-2636, and since - to put it in Greg Kroah-Hatrman's words - we do not "trust the userspace to do the right thing", this reduces local kernel attack surface. Further, there is no legitimate reason why an unprivileged user should load kernel modules during runtime, anyway. See also: - https://lkml.org/lkml/2019/4/15/890 - https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html Cc: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org> Cc: Michael Tremer <michael.tremer@ipfire.org> Signed-off-by: Peter Müller <peter.mueller@ipfire.org> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
This commit is contained in:
committed by
Michael Tremer
parent
6ec99a3372
commit
14c65ab71c
@@ -39,6 +39,10 @@ net.bridge.bridge-nf-call-ip6tables = 0
|
||||
net.bridge.bridge-nf-call-iptables = 0
|
||||
net.bridge.bridge-nf-call-arptables = 0
|
||||
|
||||
# Restrict loading TTY line disciplines to CAP_SYS_MODULE to prevent unprivileged attackers
|
||||
# from loading vulnerable line disciplines with the TIOCSETD ioctl.
|
||||
dev.tty.ldisc_autoload = 0
|
||||
|
||||
# Try to keep kernel address exposures out of various /proc files (kallsyms, modules, etc).
|
||||
kernel.kptr_restrict = 2
|
||||
|
||||
|
||||
Reference in New Issue
Block a user