UCF STIG Viewer Logo

Local initialization files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22362 GEN001890 SV-45156r1_rule Medium
Description
Local initialization files are used to configure the user's shell environment upon login. Malicious modification of these files could compromise accounts upon logon.
STIG Date
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide 2018-09-19

Details

Check Text ( C-42499r1_chk )
Check user home directories for local initialization files with extended ACLs.
# for HOMEDIR in $(cut -d: -f6 /etc/passwd); do find ${HOMEDIR} -type f -name '\.*' | xargs ls -ld | grep '\+'; done

If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding.
Fix Text (F-38552r1_fix)
Remove the extended ACL from the file.
# setfacl --remove-all