DISA STIGS Viewer

AlmaLinux OS 9 must prevent a user from overriding the disabling of the graphical user interface autorun function.

Overview

Finding ID Version Rule ID IA Controls Severity
V-269379 ALMA-09-035110 SV-269379r1050262_rule   Medium
Description
Automatically mounting filesystems and running applications upon insertion of a device facilitates malicious activity. Satisfies: SRG-OS-000378-GPOS-00163, SRG-OS-000114-GPOS-00059
STIG Date
CloudLinux AlmaLinux OS 9 Security Technical Implementation Guide 2025-05-22

Details

Check Text (C-73410r1049585_chk)
Note: This requirement assumes the use of the AlmaLinux OS 9 default graphical user interface, the GNOME desktop environment. If the system does not have any graphical user interface installed, this requirement is Not Applicable.

Verify AlmaLinux OS 9 disables ability of the user to override the graphical user interface autorun setting.

Determine which profile the system database is using with the following command:

$ grep system-db /etc/dconf/profile/user

system-db:local

Check that the automount setting is locked from nonprivileged user modification with the following command:

Note: The example below is using the database "local" for the system, so the path is "/etc/dconf/db/local.d". This path must be modified if a database other than "local" is being used.

$ grep 'autorun-never' /etc/dconf/db/local.d/locks/*

/org/gnome/desktop/media-handling/autorun-never

If the command does not return at least the example result, this is a finding.
Fix Text (F-73311r1048514_fix)
Configure the GNOME desktop to not allow a user to change the setting that disables autorun on removable media.

Add the following line to "/etc/dconf/db/local.d/locks/00-security-settings-lock" to prevent user modification:

/org/gnome/desktop/media-handling/autorun-never

Then update the dconf system databases:

$ dconf update