UCF STIG Viewer Logo

The cron.deny file must have mode 0600 or less permissive.


Overview

Finding ID Version Rule ID IA Controls Severity
V-4358 GEN003200 SV-64329r1_rule ECLP-1 Medium
Description
If file permissions for cron.deny are more permissive than 0600, sensitive information could be viewed or edited by unauthorized users.
STIG Date
Oracle Linux 5 Security Technical Implementation Guide 2015-03-26

Details

Check Text ( C-52741r1_chk )
Check the mode of the cron.deny file.
# ls -lL /etc/cron.deny
If the cron.deny file does not exist this is not a finding.
If the cron.deny file exists and the mode is more permissive than 0600, this is a finding.
Fix Text (F-54917r1_fix)
Change the mode of the cron.deny file.
# chmod 0600 /etc/cron.deny