STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Oracle Linux 8 Security Technical Implementation Guide

V-248706

CAT II (Medium)

The OL 8 lastlog command must be owned by root.

Rule ID

SV-248706r958566_rule

STIG

Oracle Linux 8 Security Technical Implementation Guide

Version

V2R8

CCIs

CCI-001314

Discussion

Unauthorized disclosure of the contents of the /var/log/lastlog file can reveal system data to attackers, thus compromising its confidentiality.

Check Content

Verify the "lastlog" command is owned by root with the following command:  

$ sudo ls -l /usr/bin/lastlog 

-rwxr-x---. 1  root  root  21200 Nov  4   22:51  /usr/bin/lastlog 

If the "lastlog" command is not owned by root, this is a finding.

Fix Text

Configure the "lastlog" command for OL 8 to be owned by root with the following command:   

$ sudo chown root /usr/bin/lastlog