CCE-92659-2Platform: cpe:/o:ubuntu:ubuntu_linux:18.04 | Date: (C)2019-11-07 (M)2023-07-14 |
Monitor SELinux mandatory access controls. The parameters below monitor any write access (potential additional, deletion or modification of files in the directory) or attribute changes to the /etc/selinux directory.
Rationale:
Changes to files in this directory could indicate that an unauthorized user is attempting to modify access controls and change security contexts, leading to a compromise of the system.
Parameter:
[yes/no]
Technical Mechanism:
Add the following lines to the /etc/audit/audit.rules file.
Add the following lines to /etc/audit/audit.rules
-w /etc/selinux/ -p wa -k MAC-policy
# Execute the following command to restart auditd
# pkill -P 1-HUP auditd
CCSS Severity: | CCSS Metrics: |
CCSS Score : 5.7 | Attack Vector: LOCAL |
Exploit Score: 1.5 | Attack Complexity: LOW |
Impact Score: 3.7 | Privileges Required: HIGH |
Severity: MEDIUM | User Interaction: NONE |
Vector: AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L | Scope: CHANGED |
| Confidentiality: LOW |
| Integrity: LOW |
| Availability: LOW |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:51258 |