File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.76-1
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 110,644 kB
  • sloc: xml: 241,883; sh: 73,777; python: 32,527; makefile: 27
file content (48 lines) | stat: -rw-r--r-- 1,470 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
documentation_complete: true


title: 'System Must Avoid Meltdown and Spectre Exploit Vulnerabilities in Modern Processors'

description: |-
    Verify that Meltdown mitigations are not disabled:
    <pre>$ sudo grubby --info=ALL | grep mitigations</pre>

    The mitigations must not be set to "off".

    {{{ describe_grub2_argument_absent("mitigations=off") | indent(4) }}}

rationale: |-
    Hardware vulnerabilities allow programs to steal data that is currently processed on the
    computer. While programs are typically not permitted to read data from other programs, a
    malicious program can exploit Meltdown and Spectre to obtain secrets stored in the memory of
    other running programs. This might include passwords stored in a password manager or browser;
    personal photos, emails, and instant messages; and business-critical documents.

severity: medium

references:
    disa: CCI-000366
    nist: CM-6(b),CM-6.1(iv)
    srg: SRG-OS-000480-GPOS-00227
    stigid@ol8: OL08-00-010424


ocil_clause: 'mitigations is set to off'

ocil: |-
    Verify that Meltdown mitigations are not disabled in any kernel:

    <pre>$ sudo grubby --info=ALL | grep mitigations</pre>


fixtext: |-
    Remove the Meltdown mitigations:

    <pre>$ sudo grubby --update-kernel=ALL --remove-args=mitigations=off</pre>

    Reboot the system for the change to take effect.

template:
    name: grub2_bootloader_argument_absent
    vars:
        arg_name: 'mitigations=off'