Skip to content

ANSSI-BP-028 (high)

Rules and Groups employed by this XCCDF Profile

  • Emulate Privileged Access Never (PAN)

    Enabling this option prevents the kernel from accessing user-space memory directly by pointing TTBR0_EL1 to a reserved zeroed area and reserved ASI...
    Rule Medium Severity
  • Trigger a kernel BUG when data corruption is detected

    This option makes the kernel BUG when it encounters data corruption in kernel memory structures when they get checked for validity. This configurat...
    Rule Low Severity
  • Warn on W+X mappings found at boot

    Generate a warning if any W+X mappings are found at boot. This configuration is available from kernel 5.8. The configuration that was used to buil...
    Rule Medium Severity
  • Harden common str/mem functions against buffer overflows

    Detect overflows of buffers in common string and memory functions where the compiler can determine and validate the buffer sizes. This configuratio...
    Rule Medium Severity
  • Harden memory copies between kernel and userspace

    This option checks for obviously wrong memory regions when copying memory to/from the kernel (via copy_to_user() and copy_from_user() functions) by...
    Rule High Severity
  • Do not allow usercopy whitelist violations to fallback to object size

    This is a temporary option that allows missing usercopy whitelists to be discovered via a WARN() to the kernel log, instead of rejecting the copy, ...
    Rule High Severity
  • Disable vsyscall emulation

    The kernel traps and emulates calls into the fixed vsyscall address mapping. This configuration is available from kernel 5.3, but may be available ...
    Rule Medium Severity
  • Disable vsyscall mapping

    This config disables the vsyscall mapping at all. Attempts to use the vsyscalls will be reported to dmesg, so that either old or malicious userspac...
    Rule Medium Severity
  • Disable vsyscall emulate execution only

    The kernel traps and emulates calls into the fixed vsyscall address mapping and does not allow reads. This configuration is available from kernel 5...
    Rule Medium Severity
  • Disable the LDT (local descriptor table)

    Linux can allow user programs to install a per-process x86 Local Descriptor Table (LDT) using the modify_ldt(2) system call. This is required to ru...
    Rule Medium Severity
  • Enable poison of pages after freeing

    Fill the pages with poison patterns after free_pages() and verify the patterns before alloc_pages. This does have a potential performance impact if...
    Rule Medium Severity
  • Perform full reference count validation

    Enabling this switches the refcounting infrastructure from a fast unchecked atomic_t implementation to a fully state checked implementation, which ...
    Rule Medium Severity
  • Detect stack corruption on calls to schedule()

    This option checks for a stack overrun on calls to schedule(). If the stack end location is found to be overwritten always panic as the content of ...
    Rule Medium Severity
  • Harden slab freelist metadata

    This feature protects integrity of the allocator's metadata. This configuration is available from kernel 4.14. The configuration that was used to ...
    Rule Medium Severity
  • Randomize slab freelist

    Randomizes the freelist order used on creating new pages. This configuration is available from kernel 5.9, but may be available if backported by di...
    Rule Medium Severity
  • Disallow merge of slab caches

    For reduced kernel memory fragmentation, slab caches can be merged when they share the same size and other characteristics. This carries a risk of ...
    Rule Medium Severity
  • Stack Protector buffer overlow detection

    This feature puts, at the beginning of functions, a canary value on the stack just before the return address, and validates the value just before a...
    Rule Medium Severity
  • Strong Stack Protector

    This features adds canary logic protection to more kinds of vulnerable functions than CONFIG_STACKPROTECTOR, but not to all functions so that perfo...
    Rule Medium Severity
  • Make the kernel text and rodata read-only

    When set, kernel text and rodata memory will be made read-only, and non-text memory will be made non-executable. This configuration is available fr...
    Rule Medium Severity
  • Make the module text and rodata read-only

    When set, module text and rodata memory will be made read-only, and non-text memory will be made non-executable. This configuration is available fr...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules