GEN002990 - The cron.allow file must not have an extended ACL.

Information

A readable and/or writeable cron.allow file by other users than root could allow potential intruders and malicious users to use the file contents to help discern information, such as who is allowed to execute cron programs, which could be harmful to overall system and network security.

Solution

Remove the extended ACL from the file.
# setfacl --remove-all /etc/cron.allow

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6, 800-53|CM-5(6), CAT|II, CCI|CCI-000225, CCI|CCI-001499, Rule-ID|SV-218430r603259_rule, STIG-ID|GEN002990, STIG-Legacy|SV-64407, STIG-Legacy|V-22384, Vuln-ID|V-218430

Plugin: Unix

Control ID: e99594c74b3b69b29720e951fcdef7672a685ced5d9a4846d5cc251ba189d270