UCF STIG Viewer Logo

Skeleton files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22357 GEN001810 SV-37297r1_rule ECLP-1 Medium
Description
If the skeleton files are not protected, unauthorized personnel could change user startup parameters and possibly jeopardize user files.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2016-07-22

Details

Check Text ( None )
None
Fix Text (F-31245r1_fix)
Remove the extended ACL from the file.
# setfacl --remove-all [skeleton file with extended ACL]
or:
# ls -lL /etc/skel|grep "\+ "|sed "s/^.* \//|xargs setfacl --remove-all
will remove all ACLs from the files.