mirror of
https://github.com/vincentmli/bpfire.git
synced 2026-04-28 11:43:25 +02:00
hide kernel addresses in /proc
Make sure kernel address space is hidden from files somewhere in /proc . This reduces attack surface and partially addresses #11659. Signed-off-by: Peter Müller <peter.mueller@link38.eu> Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
This commit is contained in:
committed by
Michael Tremer
parent
a65d07ec6d
commit
373590b7c3
@@ -42,3 +42,9 @@ net.netfilter.nf_conntrack_acct=1
|
||||
net.bridge.bridge-nf-call-ip6tables = 0
|
||||
net.bridge.bridge-nf-call-iptables = 0
|
||||
net.bridge.bridge-nf-call-arptables = 0
|
||||
|
||||
# Try to keep kernel address exposures out of various /proc files (kallsyms, modules, etc).
|
||||
kernel.kptr_restrict = 1
|
||||
|
||||
# Avoid kernel memory address exposures via dmesg.
|
||||
kernel.dmesg_restrict = 1
|
||||
|
||||
Reference in New Issue
Block a user