UCF STIG Viewer Logo

All library files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22317 GEN001310 SV-44952r1_rule Medium
Description
Unauthorized access could destroy the integrity of the library files.
STIG Date
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide 2018-09-19

Details

Check Text ( C-42379r1_chk )
Verify system libraries have no extended ACLs.
# ls -lL /usr/lib/* /usr/lib64/* /lib/* /lib64/* | grep "+ "
If the permissions include a '+', the file has an extended ACL and has not been approved by the IAO, this is a finding.
Fix Text (F-38377r1_fix)
Remove the extended ACL from the file.
# setfacl --remove-all /usr/lib/* /usr/lib64/* /lib/* /lib64/*