a13xp0p0v/kernel-hardening-checker
A tool for checking the security hardening options of the Linux kernel
PythonGPL-3.0
Issues
- 5
- 3
new make hardening.config available
#92 opened by osevan - 10
- 0
- 2
Reducing Kernel Symbols on File System by Disabling CONFIG_VMLINUX_MAP and CONFIG_DEBUG_KERNEL
#110 opened by wryMitts - 2
Disable `CONFIG_N_GSM`
#122 opened by cgzones - 2
- 3
Add RDK Linux Hardening specification flags
#84 opened by frakman1 - 4
Improve --kernel-version and --cmdline
#129 opened by jvoisin - 1
Add check for CONFIG_MITIGATION_RFDS
#116 opened by wryMitts - 1
- 6
Disable codecov upload for pull-requests
#126 opened by jvoisin - 2
Integration with oracle/kconfigs
#119 opened by evdenis - 0
Add kconfig option for Intel CET shadow stack
#114 opened by winterknife - 7
- 3
- 3
The separation between desktop and server.
#118 opened by migrgh - 4
Better json output
#108 opened by avnik - 3
Suggestions for kernel-hardening-checker
#113 opened by asarubbo - 3
- 3
Get rid of CONFIG_DEBUG_CREDENTIALS
#97 opened by Sporif - 1
Minimal kernel version ?
#106 opened by ffontaine - 3
- 5
Add a check for IA32_EMULATION
#87 opened by jvoisin - 1
Add ia32_emulation kernel cmdline parameter to disable 32-bit emulation support on 64-bit x86 CPUs
#112 opened by winterknife - 4
add check for UNWIND_PATCH_PAC_INTO_SCS, which reduces security compared to using both PAC + SCS
#105 opened by thestinger - 1
New CONFIG_MODULE_SIG_SHA3_512 option in kernel 6.7
#107 opened by morfikov - 4
skip CONFIG_DEBUG_NOTIFIERS requirement when CONFIG_CFI_CLANG is set with CONFIG_CFI_PERMISSIVE disabled
#99 opened by thestinger - 2
- 3
CONFIG_ARCH_MMAP_RND_BITS check is wrong for arm64
#101 opened by thestinger - 3
CONFIG_COMPAT_VDSO has a completely different meaning for arm64 and recommending disabling it doesn't make sense there
#100 opened by thestinger - 1
- 2
- 2
Enhancement add kmalloc hardening
#83 opened by osevan - 1
Check for module force loading?
#95 opened by vobst - 1
- 15
Color indicators for "check result" column
#81 opened by harisphnx - 1
Support checking sysctl security options
#65 opened by a13xp0p0v - 3
- 1
Integrity Measurement Architecture
#75 opened by JohnVengert - 1
- 1
iommu=force
#76 opened by d4rklynk - 6
Fix getting Nix kconfig (contrib)
#63 opened by a13xp0p0v - 2
- 3
- 3
Config change in 5.19.X
#71 opened by Churam - 6
- 1
Create a tool reporting mainline kernel versions that support a recommended option
#68 opened by a13xp0p0v - 5
Let user select configs without absolute path
#61 opened by dmknght - 2