File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.76-1
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 110,644 kB
  • sloc: xml: 241,883; sh: 73,777; python: 32,527; makefile: 27
file content (35 lines) | stat: -rw-r--r-- 1,190 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
documentation_complete: true

title: 'Verify Permissions on System.map Files'

description: |-
    The System.map files are symbol map files generated during the compilation of the Linux
    kernel. They contain the mapping between kernel symbols and their corresponding memory
    addresses. In general, there is no need for non-root users to read these files.

    {{{ describe_file_permissions(file="/boot/System.map*", perms="0600") }}}

rationale: |-
    The purpose of <tt>System.map</tt> files is primarily for debugging and profiling the kernel.
    Unrestricted access to these files might disclose information useful to attackers and
    malicious software leading to more sophisticated exploitation.

severity: low

identifiers:
    cce@rhel8: CCE-82892-1
    cce@rhel9: CCE-86581-6
    cce@rhel10: CCE-86786-1

ocil_clause: '{{{ ocil_clause_file_permissions(file="/boot/System.map*", perms="-rw-------") }}}'

ocil: |-
    {{{ ocil_file_permissions(file="/boot/System.map*", perms="-rw-------") }}}

template:
    name: file_permissions
    vars:
        filepath: /boot/
        file_regex: ^.*System\.map.*$
        filemode: '0600'
        allow_stricter_permissions: 'true'