SLEM 5 must restrict privilege elevation to authorized personnel.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-261375 | SLEM-05-432025 | SV-261375r996562_rule | Medium |
| Description |
| The sudo command allows a user to execute programs with elevated (administrator) privileges. It prompts the user for their password and confirms the request to execute a command by checking a file, called sudoers. If the "sudoers" file is not configured correctly, any user defined on the system can initiate privileged actions on the target system. |
| STIG | Date |
| SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide | 2025-05-08 |
Details
| Check Text (C-65104r996561_chk) |
| Verify the "sudoers" file restricts sudo access to authorized personnel with the following command: > sudo grep -iw 'ALL' /etc/sudoers /etc/sudoers.d/* root ALL=(ALL) ALL If "ALL ALL=(ALL) ALL" or "ALL ALL=(ALL:ALL) ALL" entries are returned, this is a finding. |
| Fix Text (F-65012r995991_fix) |
| Remove the following entries from the "/etc/sudoers" file: ALL ALL=(ALL) ALL ALL ALL=(ALL:ALL) ALL |