Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22587 | GEN008780 | SV-26989r2_rule | Medium |
Description |
---|
The system's boot loader configuration files are critical to the integrity of the system and must be protected. Unauthorized modifications resulting from improper group ownership may compromise the boot loader configuration. |
STIG | Date |
---|---|
Solaris 10 X86 Security Technical Implementation Guide | 2019-12-31 |
Check Text ( C-27931r3_chk ) |
---|
This check applies to the global zone only. Determine the type of zone that you are currently securing. # zonename If the command output is "global", this check applies. On systems that have a ZFS root, the active menu.lst file is typically located at /pool-name/boot/grub/menu.lst where "pool-name" is the mount point for the top-level dataset. On systems that have a UFS root, the active menu.lst file is typically located at /boot/grub/menu.lst. To locate the active GRUB menu, use the bootadm command with the list-menu option: # bootadm list-menu Check the group ownership of the menu.lst file. Procedure: # ls -lL /pool-name/boot/grub/menu.lst or # ls -lL /boot/grub/menu.lst If the group owner of the file is not root, bin, sys, or system this is a finding. |
Fix Text (F-24254r2_fix) |
---|
Change the group ownership of the file. # chgrp root /pool-name/boot/grub/menu.lst or # chgrp root /boot/grub/menu.lst |