STIGQter STIGQter: STIG Summary: Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 10 Mar 2021:

The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.

DISA Rule

SV-238332r654171_rule

Vulnerability Number

V-238332

Group Title

SRG-OS-000138-GPOS-00069

Rule Version

UBTU-20-010411

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure all public directories to have the sticky bit set to prevent unauthorized and unintended information transferred via shared system resources.

Set the sticky bit on all public directories using the following command, replacing "[Public Directory]" with any directory path missing the sticky bit:

$ sudo chmod +t [Public Directory]

Check Contents

Verify that all public (world-writeable) directories have the public sticky bit set.

Find world-writable directories that lack the sticky bit by running the following command:

$ sudo find / -type d -perm -002 ! -perm -1000

If any world-writable directories are found missing the sticky bit, this is a finding.

Vulnerability Number

V-238332

Documentable

False

Rule Version

UBTU-20-010411

Severity Override Guidance

Verify that all public (world-writeable) directories have the public sticky bit set.

Find world-writable directories that lack the sticky bit by running the following command:

$ sudo find / -type d -perm -002 ! -perm -1000

If any world-writable directories are found missing the sticky bit, this is a finding.

Check Content Reference

M

Target Key

5318

Comments