You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
After Audit 5.1.3 from the Security Remediation script was executed, chmod o-w gets now applied to /private/tmp/
This is wrong and applications can then no longer write to the directory and therefore no longer run as intended.
This seems to happen because /private/tmp/ is a symbolic link to /System/Volumes/Data/private/tmp/. And this is on the read-only system partition under Catalina.
Please adjust the script so that this no longer happens. Thanks!
The text was updated successfully, but these errors were encountered:
if [ "$Audit5_1_3" = "1" ]; then
IFS=$'\n'
for sysPermissions in $( find /System -type d -perm -2 | grep -v "Public/Drop Box\|Data/private" ); do
chmod -R o-w "$sysPermissions"
done
echo $(date -u) "5.1.3 enforced" | tee -a "$logFile"
Tionit
changed the title
Incorrect directory permissions after executing the CIS security script under Catalina
Incorrect directory permissions after executing the CIS security remediation script under Catalina
Mar 16, 2020
pcmxgti
added a commit
to pcmxgti/CIS-for-macOS-High-Sierra-CP
that referenced
this issue
Mar 18, 2020
After Audit 5.1.3 from the Security Remediation script was executed, chmod o-w gets now applied to /private/tmp/
This is wrong and applications can then no longer write to the directory and therefore no longer run as intended.
This seems to happen because /private/tmp/ is a symbolic link to /System/Volumes/Data/private/tmp/. And this is on the read-only system partition under Catalina.
Please adjust the script so that this no longer happens. Thanks!
The text was updated successfully, but these errors were encountered: