Signed-off-by: Willy Santos <wsantos@redhat>
---
 rhel6/src/input/system/permissions/execution.xml |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)

diff --git a/rhel6/src/input/system/permissions/execution.xml 
b/rhel6/src/input/system/permissions/execution.xml
index d83fef4..1c1a58b 100644
--- a/rhel6/src/input/system/permissions/execution.xml
+++ b/rhel6/src/input/system/permissions/execution.xml
@@ -184,7 +184,7 @@ on AMD-based systems.</description>
 <rationale>Computers with the ability to prevent this type of code execution 
frequently put an option in the BIOS that will
 allow users to turn the feature on or off at will.</rationale>
 <ident cce="4177-2" />
-<!--<ref nist="CM-7" />-->
+<ref nist="CM-6" />
 </Rule>
 
 </Group> <!--<Group id="enable_nx"> -->
-- 
1.7.7.6

_______________________________________________
scap-security-guide mailing list
scap-security-guide@lists.fedorahosted.org
https://fedorahosted.org/mailman/listinfo/scap-security-guide

Reply via email to