Skip to content

Commit 3c613e4

Browse files
Apply the pam_options template for use_pam_wheel_for_su and use_pam_wheel_group_for_su
1 parent b5fea19 commit 3c613e4

8 files changed

Lines changed: 27 additions & 97 deletions

File tree

linux_os/guide/system/accounts/accounts-restrictions/root_logins/use_pam_wheel_for_su/ansible/shared.yml

Lines changed: 0 additions & 11 deletions
This file was deleted.

linux_os/guide/system/accounts/accounts-restrictions/root_logins/use_pam_wheel_for_su/bash/shared.sh

Lines changed: 0 additions & 4 deletions
This file was deleted.

linux_os/guide/system/accounts/accounts-restrictions/root_logins/use_pam_wheel_for_su/oval/shared.xml

Lines changed: 0 additions & 21 deletions
This file was deleted.

linux_os/guide/system/accounts/accounts-restrictions/root_logins/use_pam_wheel_for_su/rule.yml

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,3 +61,14 @@ vuldiscussion: |-
6161
When operating systems provide the capability to escalate a functional capability, it is critical the user re-authenticate.
6262
6363
platform: package[pam]
64+
65+
template:
66+
name: pam_options
67+
vars:
68+
path: /etc/pam.d/su
69+
type: auth
70+
control_flag: required
71+
module: pam_wheel.so
72+
arguments:
73+
- argument: use_uid
74+
new_argument: use_uid

linux_os/guide/system/accounts/accounts-restrictions/root_logins/use_pam_wheel_group_for_su/ansible/shared.yml

Lines changed: 0 additions & 14 deletions
This file was deleted.

linux_os/guide/system/accounts/accounts-restrictions/root_logins/use_pam_wheel_group_for_su/bash/shared.sh

Lines changed: 0 additions & 15 deletions
This file was deleted.

linux_os/guide/system/accounts/accounts-restrictions/root_logins/use_pam_wheel_group_for_su/oval/shared.xml

Lines changed: 0 additions & 31 deletions
This file was deleted.

linux_os/guide/system/accounts/accounts-restrictions/root_logins/use_pam_wheel_group_for_su/rule.yml

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,24 @@ ocil: |-
3737
Run the following command to check if the line is present:
3838
<pre>grep pam_wheel /etc/pam.d/su</pre>
3939
The output should contain the following line:
40-
<pre>auth required pam_wheel.so use_uid group={{{ xccdf_value("var_pam_wheel_group_for_su") }}}</pre>
40+
<pre>auth required pam_wheel.so use_uid group={{{ xccdf_value("var_pam_wheel_group_for_su.var") }}}</pre>
4141
4242
warnings:
4343
- general: |-
4444
Note that <tt>ensure_pam_wheel_group_empty</tt> rule complements this requirement by
4545
ensuring the referenced group exists and has no members.
46+
47+
template:
48+
name: pam_options
49+
vars:
50+
path: /etc/pam.d/su
51+
type: auth
52+
control_flag: required
53+
module: pam_wheel.so
54+
arguments:
55+
- variable: group
56+
variable_name: var_pam_wheel_group_for_su
57+
operation: equals
58+
datatype: string
59+
- argument: use_uid
60+
new_argument: use_uid

0 commit comments

Comments
 (0)