UCF STIG Viewer Logo

Skeleton files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22357 GEN001810 SV-45134r1_rule ECLP-1 Medium
Description
If the skeleton files are not protected, unauthorized personnel could change user startup parameters and possibly jeopardize user files.
STIG Date
SUSE Linux Enterprise Server v11 for System z 2013-04-18

Details

Check Text ( C-42479r1_chk )
Check skeleton files for extended ACLs:
# ls -alL /etc/skel.
If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding.
Fix Text (F-38530r1_fix)
Remove the extended ACL from the file.
# setfacl --remove-all [skeleton file with extended ACL]
or:
# ls -lL /etc/skel|grep "\+ "|awk ‘{print “/etc/skel/”$9}’|xargs setfacl --remove-all
will remove all ACLs from the files.