CCE-95048-5Platform: cpe:/o:ubuntu:ubuntu_linux:20.04,cpe:/o:ubuntu:ubuntu_linux:22.04, cpe:/o:ubuntu:ubuntu_linux:23.04 | Date: (C)2020-10-15 (M)2023-09-01 |
The auditd daemon can be configured to halt the system when the audit logs are full.
Rationale:
In high security contexts, the risk of detecting unauthorized access or nonrepudiation exceeds the benefit of the systems availability.
Parameter:
[ignore/syslog/email, email account, ignore/syslog/email/exec/suspend/single/halt]
Technical Mechanism:
Add the following lines to the /etc/audit/auditd.conf file.
space_left_action = email
action_mail_acct = root
admin_space_left_action = halt
CCSS Severity: | CCSS Metrics: |
CCSS Score : 7.3 | Attack Vector: NETWORK |
Exploit Score: 3.9 | Attack Complexity: LOW |
Impact Score: 3.4 | Privileges Required: NONE |
Severity: HIGH | User Interaction: NONE |
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L | Scope: UNCHANGED |
| Confidentiality: LOW |
| Integrity: LOW |
| Availability: LOW |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:92226 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:85124 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:65955 |