UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

OL 8 must require re-authentication when using the "sudo" command.


Overview

Finding ID Version Rule ID IA Controls Severity
V-248585 OL08-00-010384 SV-248585r880557_rule Medium
Description
Without re-authentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, it is critical the organization requires the user to re-authenticate when using the "sudo" command. If the value is set to an integer less than 0, the user's time stamp will not expire and the user will not have to re-authenticate for privileged actions until the user's session is terminated. Satisfies: SRG-OS-000373-GPOS-00156, SRG-OS-000373-GPOS-00157, SRG-OS-000373-GPOS-00158
STIG Date
Oracle Linux 8 Security Technical Implementation Guide 2024-02-19

Details

Check Text ( C-52019r880555_chk )
Verify the operating system requires re-authentication when using the "sudo" command to elevate privileges.

$ sudo grep -Eir 'timestamp_timeout' /etc/sudoers /etc/sudoers.d*
/etc/sudoers:Defaults timestamp_timeout=0

If conflicting results are returned, this is a finding.

If "timestamp_timeout" is set to a negative number, is commented out, or no results are returned, this is a finding.
Fix Text (F-51973r880556_fix)
Configure the "sudo" command to require re-authentication.

Edit the /etc/sudoers file:
$ sudo visudo

Add or modify the following line:
Defaults timestamp_timeout=[value]

Note: The "[value]" must be a number that is greater than or equal to "0".

Remove any duplicate or conflicting lines from /etc/sudoers and /etc/sudoers.d/ files.