Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
K
kernel-hardening-checker
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
fact-depend
kernel-hardening-checker
Commits
aec7c459
Commit
aec7c459
authored
Apr 09, 2020
by
Alexander Popov
Browse files
Options
Browse Files
Download
Plain Diff
Merge branch 'evbug'
Thanks @HacKurx
parents
d5d5480f
cb1d79b0
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
3 additions
and
1 deletions
+3
-1
README.md
README.md
+2
-1
__init__.py
kconfig_hardened_check/__init__.py
+1
-0
No files found.
README.md
View file @
aec7c459
...
...
@@ -204,10 +204,11 @@ CONFIG_IP_SCTP | is not set | my | cut_atta
CONFIG_FTRACE | is not set | my | cut_attack_surface | FAIL: "y"
CONFIG_BPF_JIT | is not set | my | cut_attack_surface | FAIL: "y"
CONFIG_VIDEO_VIVID | is not set | my | cut_attack_surface | FAIL: "m"
CONFIG_INPUT_EVBUG | is not set | my | cut_attack_surface | FAIL: "m"
CONFIG_INTEGRITY | y |defconfig |userspace_hardening | OK
CONFIG_ARCH_MMAP_RND_BITS | 32 | clipos |userspace_hardening | FAIL: "28"
[+] config check is finished: 'OK' - 56 / 'FAIL' -
79
[+] config check is finished: 'OK' - 56 / 'FAIL' -
80
```
## kconfig-hardened-check versioning
...
...
kconfig_hardened_check/__init__.py
View file @
aec7c459
...
...
@@ -492,6 +492,7 @@ def construct_checklist(checklist, arch):
checklist
.
append
(
OptCheck
(
'FTRACE'
,
'is not set'
,
'my'
,
'cut_attack_surface'
))
# refers to LOCKDOWN
checklist
.
append
(
OptCheck
(
'BPF_JIT'
,
'is not set'
,
'my'
,
'cut_attack_surface'
))
checklist
.
append
(
OptCheck
(
'VIDEO_VIVID'
,
'is not set'
,
'my'
,
'cut_attack_surface'
))
checklist
.
append
(
OptCheck
(
'INPUT_EVBUG'
,
'is not set'
,
'my'
,
'cut_attack_surface'
))
# Can be used as a keylogger
checklist
.
append
(
OptCheck
(
'INTEGRITY'
,
'y'
,
'defconfig'
,
'userspace_hardening'
))
if
arch
==
'ARM64'
:
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment