RHEL 10 must be configured so that the file integrity tool verifies extended attributes.

STIG ID: RHEL-10-200635  |  SRG: SRG-OS-000404-GPOS-00183 |  Severity: medium (CAT II)  |  CCI: CCI-002475 |  Vulnerability Id: V-280982

Vulnerability Discussion

RHEL 10 installation media ships with an optional file integrity tool called Advanced Intrusion Detection Environment (AIDE). AIDE is highly configurable at install time. This requirement assumes the "aide.conf" file is under the "/etc" directory.

Extended attributes in file systems are used to contain arbitrary data and file metadata with security implications.

Check

Verify RHEL 10 AIDE is configured to verify extended attributes with the following command:

$ sudo grep -E '^[^#]*xattrs' /etc/aide.conf
FIPSR = p+i+n+u+g+s+m+growing+acl+selinux+xattrs+sha512
/usr/sbin/auditctl p+i+n+u+g+s+b+acl+xattrs+sha512
/usr/sbin/auditd p+i+n+u+g+s+b+acl+xattrs+sha512
/usr/sbin/ausearch p+i+n+u+g+s+b+acl+xattrs+sha512
/usr/sbin/aureport p+i+n+u+g+s+b+acl+xattrs+sha512
/usr/sbin/augenrules p+i+n+u+g+s+b+acl+xattrs+sha512
DIR = p+i+n+u+g+acl+selinux+xattrs

Open the file and verify that no additional uncommented file and directory selection lines are missing the "xattrs" rule.

If the "xattrs" rule is not being used on all uncommented selection lines in the "/etc/aide.conf" file, or extended attributes are not being checked by another file integrity tool, this is a finding.

Fix

Configure RHEL 10 so that the file integrity tool checks file and directory extended attributes.

If AIDE is installed, ensure the "xattrs" rule is present on all uncommented file and directory selection lists.