>From 693e04c22b41e70fe49ea78a6ba1133cf62d8406 Mon Sep 17 00:00:00 2001 From: Shawn Wells Date: Wed, 20 Mar 2013 19:44:58 -0400 Subject: [PATCH] ticket 338 - improve check text for noexec on removable media Updated grep to search for the negative; calls for manual inspection of output --- RHEL6/input/system/permissions/partitions.xml | 7 ++++--- 1 files changed, 4 insertions(+), 3 deletions(-) diff --git a/RHEL6/input/system/permissions/partitions.xml b/RHEL6/input/system/permissions/partitions.xml index a9a7b2d..1026e9b 100644 --- a/RHEL6/input/system/permissions/partitions.xml +++ b/RHEL6/input/system/permissions/partitions.xml @@ -64,10 +64,11 @@ certain types of worms or malicious code. Allowing users to execute binaries from removable media such as USB keys exposes the system to potential compromise. - + To verify that binaries cannot be directly executed from removable media, run the following command: -
# grep noexec /etc/fstab
-The output should show noexec in use. +
# grep -v noexec /etc/fstab
+The resulting output will show partitions which do not have the noexec flag. Verify all partitions +in the output are not removable media.
-- 1.7.1