RHEL-09-212050 - RHEL 9 must enable mitigations against processor-based vulnerabilities.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Kernel page-table isolation is a kernel feature that mitigates the Meltdown security vulnerability and hardens the kernel against attempts to bypass kernel address space layout randomization (KASLR).

Satisfies: SRG-OS-000433-GPOS-00193, SRG-OS-000095-GPOS-00049

Solution

Configure RHEL 9 to enable kernel page-table isolation with the following command:

$ sudo grubby --update-kernel=ALL --args='pti=on'

Add or modify the following line in '/etc/default/grub' to ensure the configuration survives kernel updates:

GRUB_CMDLINE_LINUX='pti=on'

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_9_V1R2_STIG.zip

Item Details

References: CAT|III, CCI|CCI-000381, CCI|CCI-002824, Rule-ID|SV-257795r925372_rule, STIG-ID|RHEL-09-212050, Vuln-ID|V-257795

Plugin: Unix

Control ID: 3acbe5a6c2de72210cdf20a8f4b69c40327a3658cd20033224fbfbc32507b9e8