Skip to content

Commit 17edecc

Browse files
Extend OVAL filters to exclude dracut temp files
1 parent f31bafe commit 17edecc

1 file changed

Lines changed: 5 additions & 0 deletions

File tree

  • linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands/oval

linux_os/guide/system/auditing/auditd_configure_rules/audit_privileged_commands/audit_rules_privileged_commands/oval/shared.xml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,10 @@
6060
<unix:sgid datatype="boolean">true</unix:sgid>
6161
</unix:file_state>
6262

63+
<unix:file_state id="state_dracut_tmp_files" version="1">
64+
<unix:filepath operation="pattern match">^/var/tmp/dracut.*</unix:filepath>
65+
</unix:file_state>
66+
6367
<!-- This file_object will only find privileged commands located only in file systems that allow
6468
their execution. The recurse_file_system parameter is set to defined in order to make sure
6569
the probe doesn't leave the scope of that mount point. For example, when probing "/", the
@@ -73,6 +77,7 @@
7377
var_ref="var_audit_rules_privileged_commands_exec_mountpoints"/>
7478
<unix:filename operation="pattern match">^\w+</unix:filename>
7579
<filter action="include">state_setuid_or_setgid_set</filter>
80+
<filter action="exclude">state_dracut_tmp_files</filter>
7681
</unix:file_object>
7782

7883
<local_variable id="var_audit_rules_privileged_commands_priv_cmds" version="1"

0 commit comments

Comments
 (0)