UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SUSE operating system must prevent unauthorized users from accessing system error messages.


Overview

Finding ID Version Rule ID IA Controls Severity
V-217188 SLES-12-010890 SV-217188r646734_rule Medium
Description
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the SUSE operating system or platform. Additionally, Personally Identifiable Information (PII) and operational information must not be revealed through error messages to unauthorized personnel or their designated representatives. The structure and content of error messages must be carefully considered by the organization and development team. The extent to which the information system is able to identify and handle error conditions is guided by organizational policy and operational requirements.
STIG Date
SLES 12 Security Technical Implementation Guide 2023-06-02

Details

Check Text ( C-18416r646732_chk )
Verify that the SUSE operating system prevents unauthorized users from accessing system error messages.

Check the "/var/log/messages" file permissions with the following comand:

> sudo stat -c "%n %U:%G %a" /var/log/messages

/var/log/messages root:root 640

Check that "permissions.local" file contains the correct permissions rules with the following command:

> grep -i messages /etc/permissions.local

/var/log/messages root:root 640

If the effective permissions do not match the "permissions.local" file, the command does not return any output, or is commented out, this is a finding.
Fix Text (F-18414r646733_fix)
Configure the SUSE operating system to prevent unauthorized users from accessing system error messages.

Add or update the following rules in "/etc/permissions.local":

/var/log/messages root:root 640

Set the correct permissions with the following command:

> sudo chkstat --set --system