mirror of
https://github.com/Kicksecure/security-misc.git
synced 2025-11-25 22:18:33 -05:00
Typo fixes
This commit is contained in:
parent
35fce26476
commit
026d55ac41
3 changed files with 4 additions and 4 deletions
|
|
@ -63,7 +63,7 @@ configuration file and significant hardening is applied to a myriad of component
|
||||||
#### User space
|
#### User space
|
||||||
|
|
||||||
- Disable the usage of `ptrace()` by all processes as it enables programs to inspect
|
- Disable the usage of `ptrace()` by all processes as it enables programs to inspect
|
||||||
and modify other active processes
|
and modify other active processes.
|
||||||
|
|
||||||
- Maximize the bits of entropy used for mmap ASLR across all CPU architectures.
|
- Maximize the bits of entropy used for mmap ASLR across all CPU architectures.
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -7,7 +7,7 @@
|
||||||
## KSPP=no: not (currently) compliant with recommendations by the KSPP
|
## KSPP=no: not (currently) compliant with recommendations by the KSPP
|
||||||
## If there is no explicit KSPP compliance notice, the setting is not mentioned by the KSPP.
|
## If there is no explicit KSPP compliance notice, the setting is not mentioned by the KSPP.
|
||||||
|
|
||||||
## Diable the usage of the ptrace() system call by all processes.
|
## Disable the usage of the ptrace() system call by all processes.
|
||||||
## Restrict ptrace() as it enables programs to inspect and modify other active processes.
|
## Restrict ptrace() as it enables programs to inspect and modify other active processes.
|
||||||
## Prevents native code debugging which some programs use as a method to detect tampering.
|
## Prevents native code debugging which some programs use as a method to detect tampering.
|
||||||
## May cause breakages in 'anti-cheat' software and programs running under Proton/WINE.
|
## May cause breakages in 'anti-cheat' software and programs running under Proton/WINE.
|
||||||
|
|
|
||||||
|
|
@ -234,7 +234,7 @@ kernel.io_uring_disabled=2
|
||||||
##
|
##
|
||||||
## https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-userspace
|
## https://madaidans-insecurities.github.io/guides/linux-hardening.html#sysctl-userspace
|
||||||
|
|
||||||
## Diable the usage of the ptrace() system call by all processes.
|
## Disable the usage of the ptrace() system call by all processes.
|
||||||
## Restrict ptrace() as it enables programs to inspect and modify other active processes.
|
## Restrict ptrace() as it enables programs to inspect and modify other active processes.
|
||||||
## Prevents native code debugging which some programs use as a method to detect tampering.
|
## Prevents native code debugging which some programs use as a method to detect tampering.
|
||||||
## May cause breakages in 'anti-cheat' software and programs running under Proton/WINE.
|
## May cause breakages in 'anti-cheat' software and programs running under Proton/WINE.
|
||||||
|
|
@ -248,7 +248,7 @@ kernel.io_uring_disabled=2
|
||||||
## KSPP=yes
|
## KSPP=yes
|
||||||
## KSPP sets the sysctl.
|
## KSPP sets the sysctl.
|
||||||
##
|
##
|
||||||
## See /usr/lib/sysctl.d/30_security_misc-ptrace-disable.conf for implementation.
|
## See /usr/lib/sysctl.d/30_security-misc_ptrace-disable.conf for implementation.
|
||||||
##
|
##
|
||||||
#kernel.yama.ptrace_scope=3
|
#kernel.yama.ptrace_scope=3
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue