diff --git a/linux_os/guide/system/bootloader-grub2/grub2_spectre_v2_argument/rule.yml b/linux_os/guide/system/bootloader-grub2/grub2_spectre_v2_argument/rule.yml index 07545e4b616..116f1f3d75c 100644 --- a/linux_os/guide/system/bootloader-grub2/grub2_spectre_v2_argument/rule.yml +++ b/linux_os/guide/system/bootloader-grub2/grub2_spectre_v2_argument/rule.yml @@ -14,7 +14,7 @@ description: |- Enforce the Spectre V2 mitigation by adding the argument spectre_v2=on to the default GRUB 2 command line for the Linux operating system. - {{{ describe_grub2_argument("spectre_v2=on)") | indent(4) }}} + {{{ describe_grub2_argument("spectre_v2=on") | indent(4) }}} rationale: |- The Spectre V2 vulnerability allows an attacker to read memory that he should not have