mirror of
https://github.com/Kicksecure/security-misc.git
synced 2025-05-06 19:25:04 -04:00
Merge pull request #263 from raja-grewal/max_user_namespaces
Provide option to disable user namespaces
This commit is contained in:
commit
73900b59db
2 changed files with 10 additions and 1 deletions
|
@ -93,11 +93,20 @@ kernel.sysrq=0
|
|||
## User namespaces aim to improve sandboxing and accessibility for unprivileged users.
|
||||
## Unprivileged user namespaces pose substantial privilege escalation risks.
|
||||
## Restricting may lead to breakages in numerous software packages.
|
||||
## Uncomment the second sysctl to entirely disable user namespaces.
|
||||
## Disabling entirely will reduce compatibility with some AppArmor profiles.
|
||||
##
|
||||
## https://lwn.net/Articles/673597/
|
||||
## https://madaidans-insecurities.github.io/linux.html#kernel
|
||||
## https://github.com/a13xp0p0v/kernel-hardening-checker#questions-and-answers
|
||||
## https://github.com/NixOS/nixpkgs/pull/84522#issuecomment-614640601
|
||||
## https://github.com/Kicksecure/security-misc/pull/263
|
||||
##
|
||||
## KSPP=partial
|
||||
## KSPP sets the stricter sysctl user.max_user_namespaces=0.
|
||||
##
|
||||
kernel.unprivileged_userns_clone=0
|
||||
#user.max_user_namespaces=0
|
||||
|
||||
## Restricts kernel profiling to users with CAP_PERFMON.
|
||||
## The performance events system should not be accessible by unprivileged users.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue