mirror of
https://github.com/Kicksecure/security-misc.git
synced 2025-06-22 08:24:10 -04:00
formatting.
use chapter to make allow for deep linking
This commit is contained in:
parent
485d9abd1d
commit
d6a7cd3e0d
1 changed files with 5 additions and 5 deletions
10
README.md
10
README.md
|
@ -14,7 +14,7 @@ many more sources.
|
||||||
sysctl settings are configured via the `/usr/lib/sysctl.d/990-security-misc.conf`
|
sysctl settings are configured via the `/usr/lib/sysctl.d/990-security-misc.conf`
|
||||||
configuration file and significant hardening is applied to a myriad of components.
|
configuration file and significant hardening is applied to a myriad of components.
|
||||||
|
|
||||||
Kernel space:
|
#### Kernel space
|
||||||
|
|
||||||
- Restrict access to kernel addresses through the use of kernel pointers regardless
|
- Restrict access to kernel addresses through the use of kernel pointers regardless
|
||||||
of user privileges.
|
of user privileges.
|
||||||
|
@ -55,7 +55,7 @@ Kernel space:
|
||||||
- Disable asynchronous I/O (when using Linux kernel >= 6.6) as `io_uring` has been
|
- Disable asynchronous I/O (when using Linux kernel >= 6.6) as `io_uring` has been
|
||||||
the source of numerous kernel exploits.
|
the source of numerous kernel exploits.
|
||||||
|
|
||||||
User space:
|
#### User space
|
||||||
|
|
||||||
- Restrict usage of `ptrace()` to only processes with `CAP_SYS_PTRACE` as it
|
- Restrict usage of `ptrace()` to only processes with `CAP_SYS_PTRACE` as it
|
||||||
enables programs to inspect and modify other active processes. Optional - Disable
|
enables programs to inspect and modify other active processes. Optional - Disable
|
||||||
|
@ -79,16 +79,16 @@ User space:
|
||||||
on a magic number or their file extension to prevent unintended code execution.
|
on a magic number or their file extension to prevent unintended code execution.
|
||||||
See issue: https://github.com/Kicksecure/security-misc/issues/267
|
See issue: https://github.com/Kicksecure/security-misc/issues/267
|
||||||
|
|
||||||
Core dumps:
|
#### Core dumps
|
||||||
|
|
||||||
- Disable core dump files and prevent their creation. If core dump files are
|
- Disable core dump files and prevent their creation. If core dump files are
|
||||||
enabled, they will be named based on `core.PID` instead of the default `core`.
|
enabled, they will be named based on `core.PID` instead of the default `core`.
|
||||||
|
|
||||||
Swap space:
|
#### Swap space
|
||||||
|
|
||||||
- Limit the copying of potentially sensitive content in memory to the swap device.
|
- Limit the copying of potentially sensitive content in memory to the swap device.
|
||||||
|
|
||||||
Networking:
|
#### Networking
|
||||||
|
|
||||||
- Enable hardening of the BPF JIT compiler protect against JIT spraying.
|
- Enable hardening of the BPF JIT compiler protect against JIT spraying.
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue