File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.76-1
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 110,644 kB
  • sloc: xml: 241,883; sh: 73,777; python: 32,527; makefile: 27
file content (32 lines) | stat: -rw-r--r-- 892 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
documentation_complete: true


title: 'Enable Kernel Parameter to Enforce DAC on Regular files'

description: '{{{ describe_sysctl_option_value(sysctl="fs.protected_regular", value="2") }}}'

rationale: |-
    This parameter is available since Linux Kernel 4.19 and allows to prohibit opening
    "regular" files that are not owned by the user in world and group writeable sticky
    directories. It avoids writes to an attacker-controlled regular file, for example,
    when a program expects to create the regular file.

severity: medium

identifiers:
    cce@rhel9: CCE-85885-2
    cce@rhel10: CCE-90354-2

references:
    nist: CM-6(a),AC-6(1)

{{{ complete_ocil_entry_sysctl_option_value(sysctl="fs.protected_regular", value="2") }}}

template:
    name: sysctl
    vars:
        sysctlvar: fs.protected_regular
        sysctlval: '2'
        datatype: int

platform: system_with_kernel