File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (44 lines) | stat: -rw-r--r-- 1,496 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
documentation_complete: true

title: 'Configure L1 Terminal Fault mitigations'

description: |-
    L1 Terminal Fault (L1TF) is a hardware vulnerability which allows unprivileged
    speculative access to data which is available in the Level 1 Data Cache when
    the page table entry isn't present.

    Select the appropriate mitigation by adding the argument
    <tt>l1tf={{{ xccdf_value("var_l1tf_options") }}}</tt> to the default
    GRUB 2 command line for the Linux operating system.
    {{{ describe_grub2_argument("l1tf=" + xccdf_value("var_l1tf_options")) | indent(4) }}}

    Since Linux Kernel 4.19 you can check the L1TF vulnerability state with the
    following command:
    <tt>cat /sys/devices/system/cpu/vulnerabilities/l1tf</tt>

rationale: |-
    The L1TF vulnerability allows an attacker to bypass memory access security controls imposed
    by the system or hypervisor. The L1TF vulnerability allows read access to any physical memory
    location that is cached in the L1 Data Cache.

warnings:
    - performance: Enabling L1TF mitigations may impact performance of the system.

severity: high

identifiers:
    cce@rhel8: CCE-88123-5
    cce@rhel9: CCE-89123-4
    cce@rhel10: CCE-86521-2

ocil_clause: 'l1tf mitigations are not configured appropriately'

ocil: |-
    {{{ ocil_grub2_argument("l1tf=" + xccdf_value("var_l1tf_options")) | indent(4) }}}


template:
    name: grub2_bootloader_argument
    vars:
        arg_name: l1tf
        arg_variable: var_l1tf_options