STIGQter: STIG Summary: Oracle Linux 5 Security Technical Implementation Guide Version: 1 Release: 13 Benchmark Date: 26 Oct 2018: The /etc/resolv.conf file must not have an extended ACL.DISA Rule
SV-64513r1_rule
Vulnerability Number
V-22322
Group Title
GEN001365
Rule Version
GEN001365
Severity
CAT II
CCI(s)
- CCI-000225 - The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions.
Weight
10
Fix Recommendation
Remove the extended ACL from the file.
# setfacl --remove-all /etc/resolv.conf
Check Contents
Verify /etc/resolv.conf has no extended ACL.
# ls -l /etc/resolv.conf
If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding.
Vulnerability Number
V-22322
Documentable
False
Rule Version
GEN001365
Severity Override Guidance
Verify /etc/resolv.conf has no extended ACL.
# ls -l /etc/resolv.conf
If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding.
Check Content Reference
M
Responsibility
System Administrator
Target Key
2207
Comments