Blame SOURCES/scap-security-guide-0.1.55-add_rule_sysctl_kernel_modules_disabled-PR_6533.patch

b5e178
From d5673795ba2f87ae1649c84591ee13d7876af0b2 Mon Sep 17 00:00:00 2001
b5e178
From: Vojtech Polasek <vpolasek@redhat.com>
b5e178
Date: Wed, 13 Jan 2021 14:01:03 +0100
b5e178
Subject: [PATCH 1/3] add rule
b5e178
b5e178
---
b5e178
 .../sysctl_kernel_modules_disabled/rule.yml   | 34 +++++++++++++++++++
b5e178
 1 file changed, 34 insertions(+)
b5e178
 create mode 100644 linux_os/guide/system/permissions/restrictions/sysctl_kernel_modules_disabled/rule.yml
b5e178
b5e178
diff --git a/linux_os/guide/system/permissions/restrictions/sysctl_kernel_modules_disabled/rule.yml b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_modules_disabled/rule.yml
b5e178
new file mode 100644
b5e178
index 0000000000..1811c43815
b5e178
--- /dev/null
b5e178
+++ b/linux_os/guide/system/permissions/restrictions/sysctl_kernel_modules_disabled/rule.yml
b5e178
@@ -0,0 +1,34 @@
b5e178
+documentation_complete: true
b5e178
+
b5e178
+prodtype: fedora,ol8,rhel7,rhel8
b5e178
+
b5e178
+title: 'Disable loading and unloading of kernel modules'
b5e178
+
b5e178
+description: '{{{ describe_sysctl_option_value(sysctl="kernel.modules_disabled", value="1") }}}'
b5e178
+
b5e178
+rationale: |-
b5e178
+    Malicious kernel modules can have a significant impact on system security and
b5e178
+    availability. Disabling loading of kernel modules prevents this threat. Note
b5e178
+    that once this option has been set, it cannot be reverted without doing a
b5e178
+    system reboot. Make sure that all needed kernel modules are loaded before
b5e178
+    setting this option.
b5e178
+
b5e178
+severity: medium
b5e178
+
b5e178
+identifiers:
b5e178
+    cce@rhel7: CCE-83392-1
b5e178
+    cce@rhel8: CCE-83397-0
b5e178
+
b5e178
+references:
b5e178
+    anssi: BP28(R24)
b5e178
+
b5e178
+{{{ complete_ocil_entry_sysctl_option_value(sysctl="kernel.modules_disabled", value="1") }}}
b5e178
+
b5e178
+platform: machine
b5e178
+
b5e178
+template:
b5e178
+    name: sysctl
b5e178
+    vars:
b5e178
+        sysctlvar: kernel.modules_disabled
b5e178
+        sysctlval: '1'
b5e178
+        datatype: int
b5e178
b5e178
From 5e4f6a4a0b70c07488595080cfd98fdbfb02e352 Mon Sep 17 00:00:00 2001
b5e178
From: Vojtech Polasek <vpolasek@redhat.com>
b5e178
Date: Wed, 13 Jan 2021 14:01:15 +0100
b5e178
Subject: [PATCH 2/3] add rule to anssi profile
b5e178
b5e178
---
b5e178
 controls/anssi.yml | 3 ++-
b5e178
 1 file changed, 2 insertions(+), 1 deletion(-)
b5e178
b5e178
diff --git a/controls/anssi.yml b/controls/anssi.yml
b5e178
index 9e2b899b6d..f435459af3 100644
b5e178
--- a/controls/anssi.yml
b5e178
+++ b/controls/anssi.yml
b5e178
@@ -483,7 +483,8 @@ controls:
b5e178
       sysctl kernel.modules_disabledconf:
b5e178
       Prohibition of loading modules (except those already loaded to this point)
b5e178
       kernel.modules_disabled = 1
b5e178
-    # rules: TBD
b5e178
+    rules:
b5e178
+    - sysctl_kernel_modules_disabled
b5e178
 
b5e178
   - id: R25
b5e178
     level: enhanced
b5e178
b5e178
From a4a91fbb7f23854e4f80819a023c1adc4e7110c5 Mon Sep 17 00:00:00 2001
b5e178
From: Vojtech Polasek <vpolasek@redhat.com>
b5e178
Date: Thu, 14 Jan 2021 09:30:01 +0100
b5e178
Subject: [PATCH 3/3] remove cces from pool
b5e178
b5e178
---
b5e178
 shared/references/cce-redhat-avail.txt | 2 --
b5e178
 1 file changed, 2 deletions(-)
b5e178
b5e178
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
b5e178
index 4dbec8255c..137d975a3d 100644
b5e178
--- a/shared/references/cce-redhat-avail.txt
b5e178
+++ b/shared/references/cce-redhat-avail.txt
b5e178
@@ -1,5 +1,3 @@
b5e178
-CCE-83392-1
b5e178
-CCE-83397-0
b5e178
 CCE-83398-8
b5e178
 CCE-83399-6
b5e178
 CCE-83404-4