-
Notifications
You must be signed in to change notification settings - Fork 710
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Problem with rule "Verify Group Who Owns /etc/cron.allow file" #11898
Labels
Ubuntu
Ubuntu product related.
Comments
I did some tests and it seams this should fix this issue:
I will create a PR for this. |
marcofortina
added a commit
to marcofortina/scap-security-guide
that referenced
this issue
Apr 26, 2024
marcofortina
added a commit
to marcofortina/scap-security-guide
that referenced
this issue
Apr 26, 2024
@marcofortina thanks for reporting this. I believe this is an issue with CIS on Ubuntu 22.04 only, they seem to have already fixed it in CIS for Ubuntu 20.04. |
Merged
marcofortina
added a commit
to marcofortina/scap-security-guide
that referenced
this issue
Apr 26, 2024
marcofortina
added a commit
to marcofortina/scap-security-guide
that referenced
this issue
Apr 26, 2024
dodys
added a commit
that referenced
this issue
Apr 29, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description of problem:
Following remediation script for this rule, will produce an error on user allowed to run cron.
SCAP Security Guide Version:
master branch
Operating System Version:
Ubuntu 22.04 LTS
Steps to Reproduce:
ubuntu
user to run cron:Additional Information/Debugging Steps:
File /etc/cron.allow should be owned by the group
crontab
:Ticket 21619 was also opened to CIS WorkBench community.
The text was updated successfully, but these errors were encountered: