1.2.1.4 Ensure access to /etc/apt/trusted.gpg.d directory is configured

Information

The /etc/apt/trusted.gpg.d directory stores individual GPG key files that APT uses to verify the authenticity of packages and repositories.

Solution

Run the following commands to set /etc/apt/trusted.gpg.d Uid and Gid to 0/root and access to 0755 or more restrictive:

# chown root:root /etc/apt/trusted.gpg.d
# chmod u=rwx,g=rx,o=rx /etc/apt/trusted.gpg.d

Impact:

A non-privileged user with write access to /etc/apt/trusted.gpg.d can compromise the chain of trust by adding new public keys to APT trusted keys configuration.

See Also

https://workbench.cisecurity.org/benchmarks/24932

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-3

Plugin: Unix

Control ID: 4fd568359d6eca2a7e599e51b176c302dea2e15422d56c34b3d0acd38f1cef18