Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22586 | GEN008760 | SV-26987r2_rule | Medium |
Description |
---|
The system's boot loader configuration files are critical to the integrity of the system and must be protected. Unauthorized modification of these files resulting from improper ownership could compromise the system's boot loader configuration. |
STIG | Date |
---|---|
Solaris 10 X86 Security Technical Implementation Guide | 2020-02-26 |
Check Text ( C-27929r2_chk ) |
---|
This check applies to the global zone only. Determine the type of zone that you are currently securing. # zonename If the command output is "global", this check applies. On systems that have a ZFS root, the active menu.lst file is typically located at /pool-name/boot/grub/menu.lst where "pool-name" is the mount point for the top-level dataset. On systems that have a UFS root, the active menu.lst file is typically located at /boot/grub/menu.lst. To locate the active GRUB menu, use the bootadm command with the list-menu option: # bootadm list-menu Check the ownership of the menu.lst file. Procedure: # ls -lL /pool-name/boot/grub/menu.lst or # ls -lL /boot/grub/menu.lst If the owner of the file is not root, this is a finding. |
Fix Text (F-24252r2_fix) |
---|
Change the ownership of the file. # chown root /pool-name/boot/grub/menu.lst or # chown root /boot/grub/menu.lst |