From Oracle Linux 5 Security Technical Implementation Guide
Part of GEN003000
Associated with: CCI-000225
If cron executes group-writable or world-writable programs, there is a possibility that unauthorized users could manipulate the programs with malicious intent. This could compromise system and network security.
List all cronjobs on the system.
Procedure:
# ls /var/spool/cron
# ls /etc/cron.d /etc/crontab /etc/cron.daily /etc/cron.hourly /etc/cron.monthly /etc/cron.weekly
or
# ls /etc/cron*|grep -v deny
If cron jobs exist under any of the above directories, use the following command to search for programs executed by cron:
# more
Remove the world-writable and group-writable permissions from the cron program file(s) identified.
# chmod go-w
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer