Check: GEN001310
SUSE Linux Enterprise Server v11 for System z STIG:
GEN001310
(in versions v1 r12 through v1 r9)
Title
All library files must not have extended ACLs. (Cat II impact)
Discussion
Unauthorized access could destroy the integrity of the library files.
Check Content
Verify system libraries have no extended ACLs. # ls -lL /usr/lib/* /usr/lib64/* /lib/* /lib64/* | grep "+ " If the permissions include a '+', the file has an extended ACL and has not been approved by the IAO, this is a finding.
Fix Text
Remove the extended ACL from the file. # setfacl --remove-all /usr/lib/* /usr/lib64/* /lib/* /lib64/*
Additional Identifiers
Rule ID: SV-44952r1_rule
Vulnerability ID: V-22317
Group Title: GEN001310
Expert Comments
Expert comments are only available to logged-in users.
CCIs
CCIs tied to check.
Number | Definition |
---|---|
CCI-001499 |
The organization limits privileges to change software resident within software libraries. |
Controls
Controls tied to check. These are derived from the CCIs shown above.
Number | Title |
---|---|
CM-5 (6) |
Limit Library Privileges |