Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Exclude symlinks for accounts_users_home_files_permissions #9748

Closed
scmeli opened this issue Oct 31, 2022 · 2 comments
Closed

Exclude symlinks for accounts_users_home_files_permissions #9748

scmeli opened this issue Oct 31, 2022 · 2 comments
Labels
enhancement General enhancements to the project. good first issue Good candidates to get started contributing to CaC.

Comments

@scmeli
Copy link

scmeli commented Oct 31, 2022

Description of problem:

The accounts_users_home_files_permissions rule does not exclude symbolic links. A symlink in a users' home directory fails the check since its permissions are always lrwxrwxrwx which is greater than 750.

Proposed change:

Add a filter to the object_accounts_users_home_files_permissions_files object to exclude symbolic links.

<oval-def:filter action="exclude">oval:ssg-state_accounts_users_home_files_permissions_files_symlink:ste:1</oval-def:filter>
<unix:file_state id="oval:ssg-state_accounts_users_home_files_permissions_files_symlink:ste:1" version="1">
  <unix:type operation="equals">symbolic link</unix:type>
</unix:file_state>

References:

  1. linux_os/guide/system/accounts/accounts-session/accounts_users_home_files_permissions/oval/shared.xml
  2. CCE-85888-6
@scmeli scmeli added the enhancement General enhancements to the project. label Oct 31, 2022
@marcusburghardt
Copy link
Member

@scmeli , would you like to propose a PR for this? It would be great.

@marcusburghardt marcusburghardt added the good first issue Good candidates to get started contributing to CaC. label Aug 21, 2023
@Mab879
Copy link
Member

Mab879 commented Dec 19, 2024

Fixed in #12585

@Mab879 Mab879 closed this as completed Dec 19, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement General enhancements to the project. good first issue Good candidates to get started contributing to CaC.
Projects
None yet
Development

No branches or pull requests

3 participants