UCF STIG Viewer Logo

The cron.deny file must not have an extended ACL.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22389 GEN003210 SV-64331r1_rule Medium
Description
If there are excessive file permissions for the cron.deny file, sensitive information could be viewed or edited by unauthorized users.
STIG Date
Oracle Linux 5 Security Technical Implementation Guide 2020-02-25

Details

Check Text ( C-53411r1_chk )
Check the permissions of the file.

# ls -lL /etc/cron.deny

If the permissions include a '+', the file has an extended ACL.

If the file has an extended ACL and it has not been documented with the IAO, this is a finding.
Fix Text (F-55761r1_fix)
Remove the extended ACL from the file.

# setfacl --remove-all /etc/cron.deny