From 66c8ccf49534629e7908f59692a1c0f94b78a4c0 Mon Sep 17 00:00:00 2001 From: Sebastien BLAISOT Date: Wed, 1 Dec 2021 10:23:11 +0100 Subject: [PATCH] Fix 3.4.2 audit rule (#123) Co-authored-by: GoldenKiwi --- bin/hardening/3.4.2_disable_sctp.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/bin/hardening/3.4.2_disable_sctp.sh b/bin/hardening/3.4.2_disable_sctp.sh index 6269304..d7a3ad9 100755 --- a/bin/hardening/3.4.2_disable_sctp.sh +++ b/bin/hardening/3.4.2_disable_sctp.sh @@ -28,7 +28,7 @@ audit() { # In an unprivileged container, the kernel modules are host dependent, so you should consider enforcing it ok "Container detected, consider host enforcing or disable this check!" else - is_kernel_option_enabled "$KERNEL_OPTION" "$MODULE_NAME" + is_kernel_option_enabled "$KERNEL_OPTION" "$MODULE_NAME" "($MODULE_NAME|install)" if [ "$FNRET" = 0 ]; then # 0 means true in bash, so it IS activated crit "$MODULE_NAME is enabled!" else