>From 3e533c3189779d0015d9bb29a1741adf2b47154b Mon Sep 17 00:00:00 2001 From: Shawn Wells Date: Fri, 19 Apr 2013 22:50:46 -0400 Subject: [PATCH 1/2] (resubmit) Ticket 396 - OVAL needed for file_ownership_library_dirs - Created OVAL - Updated XCCDF rule to reflect - Ensured all test_ref's were called out [shawn@rhel6 checks]$ ./testcheck.py file_ownership_library_dirs.xml Evaluating with OVAL tempfile : /tmp/file_ownership_etc_skelssTK5P.xml Definition oval:scap-security-guide.testing:def:100: false Evaluation done. [shawn@rhel6 checks]$ su - Password: Last login: Wed Apr 17 05:58:32 EDT 2013 on pts/0 [root@rhel6 ~]# chown -R root /lib /lib64/ /usr/lib/ /usr/lib64/ /lib/modules/ [root@rhel6 ~]# exit logout [shawn@rhel6 checks]$ ./testcheck.py file_ownership_library_dirs.xml Evaluating with OVAL tempfile : /tmp/file_ownership_etc_skelPyCa24.xml Definition oval:scap-security-guide.testing:def:100: true Evaluation done. --- RHEL6/input/checks/file_ownership_library_dirs.xml | 148 ++++++++++++++++++++ RHEL6/input/system/permissions/files.xml | 2 +- 2 files changed, 149 insertions(+), 1 deletions(-) create mode 100644 RHEL6/input/checks/file_ownership_library_dirs.xml diff --git a/RHEL6/input/checks/file_ownership_library_dirs.xml b/RHEL6/input/checks/file_ownership_library_dirs.xml new file mode 100644 index 0000000..8b5f282 --- /dev/null +++ b/RHEL6/input/checks/file_ownership_library_dirs.xml @@ -0,0 +1,148 @@ + + + + Verify that Shared Library Files Have Root Ownership + + Red Hat Enterprise Linux 6 + + Checks that /lib, /lib64, /usr/lib, /usr/lib64, /lib/modules, and objects therein, are owned by root + + + + + + + + + + + + + + + + + + + + + + + + + + + + /lib + + state_owner_not_root + + + + + /lib + ^.*$ + state_owner_not_root + + + + + + + + + + + + + + + /lib64 + + state_owner_not_root + + + + + /lib64 + ^.*$ + state_owner_not_root + + + + + + + + + + + + + + + /usr/lib + + state_owner_not_root + + + + + /usr/lib + ^.*$ + state_owner_not_root + + + + + + + + + + + + + + + /usr/lib64 + + state_owner_not_root + + + + + /usr/lib64 + ^.*$ + state_owner_not_root + + + + + + + + + + + + + + + /lib/modules + + state_owner_not_root + + + + + /lib/modules + ^.*$ + state_owner_not_root + + + + + 0 + + diff --git a/RHEL6/input/system/permissions/files.xml b/RHEL6/input/system/permissions/files.xml index 6a9c707..21af4ea 100644 --- a/RHEL6/input/system/permissions/files.xml +++ b/RHEL6/input/system/permissions/files.xml @@ -251,9 +251,9 @@ space of processes (including privileged ones) or of the kernel itself at runtime. Proper ownership is necessary to protect the integrity of the system. + - Verify that System Executables Have Restrictive Permissions -- 1.7.1