[v2] hide kernel addresses in /proc against privileged users
Commit Message
In order to make local privilege escalation more harder, hide
kernel addresses in various /proc files against users with
root (or similar) permissions, too.
Common system hardening tools such as lynis recommend this.
The second version of this patch also increments the package number.
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
---
setup/setup.nm | 2 +-
setup/sysctl/kernel-hardening.conf | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
@@ -5,7 +5,7 @@
name = setup
version = 3.0
-release = 11
+release = 12
arch = noarch
groups = Base Build System/Base
@@ -1,5 +1,5 @@
# Try to keep kernel address exposures out of various /proc files (kallsyms, modules, etc).
-kernel.kptr_restrict = 1
+kernel.kptr_restrict = 2
# Avoid kernel memory address exposures via dmesg.
kernel.dmesg_restrict = 1