Skip to content

RHEL 9 must enable hardening for the Berkeley Packet Filter just-in-time compiler.

An XCCDF Rule

Description

When hardened, the extended Berkeley Packet Filter (BPF) just-in-time (JIT) compiler will randomize any kernel addresses in the BPF programs and maps, and will not expose the JIT addresses in "/proc/kallsyms".

ID
SV-257942r1044999_rule
Version
RHEL-09-251045
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Configure RHEL 9 to enable hardening for the BPF JIT compiler by adding the following line to a file, in the "/etc/sysctl.d" directory:

net.core.bpf_jit_harden = 2

The system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:

$ sudo sysctl --system