Hello, Please increment the release number of this package. Best, -Michael > On 20 Jan 2019, at 17:03, Peter Müller wrote: > > In order to make local privilege escalation more harder, hide > kernel addresses in various /proc files against users with > root (or similar) permissions, too. > > Common system hardening tools such as lynis recommend this. > > Signed-off-by: Peter Müller > --- > setup/sysctl/kernel-hardening.conf | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/setup/sysctl/kernel-hardening.conf b/setup/sysctl/kernel-hardening.conf > index 6751bbef6..9bb6e9f45 100644 > --- a/setup/sysctl/kernel-hardening.conf > +++ b/setup/sysctl/kernel-hardening.conf > @@ -1,5 +1,5 @@ > # Try to keep kernel address exposures out of various /proc files (kallsyms, modules, etc). > -kernel.kptr_restrict = 1 > +kernel.kptr_restrict = 2 > > # Avoid kernel memory address exposures via dmesg. > kernel.dmesg_restrict = 1 > -- > 2.16.4