UCF STIG Viewer Logo

The cron.deny file must not have an extended ACL.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22389 GEN003210 SV-37486r1_rule ECLP-1 Medium
Description
If there are excessive file permissions for the cron.deny file, sensitive information could be viewed or edited by unauthorized users.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2017-03-01

Details

Check Text ( C-36145r1_chk )
Check the permissions of the file.
# ls -lL /etc/cron.deny
If the permissions include a '+', the file has an extended ACL. If the file has an extended ACL and it has not been documented with the IAO, this is a finding.
Fix Text (F-31394r1_fix)
Remove the extended ACL from the file.
# setfacl --remove-all /etc/cron.deny