UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Library files must be owned by a system account.


Overview

Finding ID Version Rule ID IA Controls Severity
V-50785 OL6-00-000046 SV-64991r4_rule Medium
Description
Files from shared library directories are loaded into the address space of processes (including privileged ones) or of the kernel itself at runtime. Proper ownership is necessary to protect the integrity of the system.
STIG Date
Oracle Linux 6 Security Technical Implementation Guide 2016-12-20

Details

Check Text ( C-53257r4_chk )
System-wide shared library files, which are linked to executables during process load time or run time, are stored in the following directories by default:

/lib
/lib64
/usr/lib
/usr/lib64
/usr/local/lib
/usr/local/lib64

Kernel modules, which can be added to the kernel during runtime, are stored in "/lib/modules". All files in these directories should not be group-writable or world-writable. To find shared libraries that are not owned by "root" and do not match what is expected by the RPM, run the following command:

for i in /lib /lib64 /usr/lib /usr/lib64 /usr/local/lib /usr/local/lib64
do
for j in `find -L $i \! -user root`
do
rpm -V -f $j | grep '^.....U'
done
done


If the command returns any results, this is a finding.
Fix Text (F-55579r4_fix)
System-wide shared library files, which are linked to executables during process load time or run time, are stored in the following directories by default:

/lib
/lib64
/usr/lib
/usr/lib64
/usr/local/lib
/usr/local/lib64

If any file in these directories is found to be owned by a user other than “root” and does not match what is expected by the RPM, correct its ownership by running one of the following commands:


# rpm --setugids [PACKAGE_NAME]

Or

# chown root [FILE]