GEN005400 - The /etc/syslog.conf file must be owned by root.

Information

If the /etc/syslog.conf file is not owned by root, unauthorized users could be allowed to view, edit, or delete important system messages handled by the syslog facility.

Solution

Use the chown command to set the owner to root.

# chown root /etc/syslog.conf

Or:

# chown root /etc/rsyslog.conf

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6, 800-53|CM-6b., CAT|II, CCI|CCI-000225, CCI|CCI-000366, Rule-ID|SV-218591r603259_rule, STIG-ID|GEN005400, STIG-Legacy|SV-63473, STIG-Legacy|V-4393, Vuln-ID|V-218591

Plugin: Unix

Control ID: 2f38065c09f8aaa74135cde6cba4055e110057b5ea8c0c938754458f59dddbf7