hide kernel addresses in /proc

Message ID c0f69deb-93f7-ba29-bd6f-d4c271540ca9@link38.eu
State Accepted
Commit 373590b7c3fb00e60d928b1b660105d4473536e1
Headers
Series hide kernel addresses in /proc |

Commit Message

Peter Müller June 30, 2018, 7:44 p.m. UTC
  Make sure kernel address space is hidden from files somewhere
in /proc . This reduces attack surface and partially addresses #11659.

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
---
 config/etc/sysctl.conf | 6 ++++++
 1 file changed, 6 insertions(+)
  

Patch

diff --git a/config/etc/sysctl.conf b/config/etc/sysctl.conf
index f3897c3c7..011c4287e 100644
--- a/config/etc/sysctl.conf
+++ b/config/etc/sysctl.conf
@@ -42,3 +42,9 @@  net.netfilter.nf_conntrack_acct=1
 net.bridge.bridge-nf-call-ip6tables = 0
 net.bridge.bridge-nf-call-iptables = 0
 net.bridge.bridge-nf-call-arptables = 0
+
+# Try to keep kernel address exposures out of various /proc files (kallsyms, modules, etc).
+kernel.kptr_restrict = 1
+
+# Avoid kernel memory address exposures via dmesg.
+kernel.dmesg_restrict = 1