GEN002140 - All shells referenced in /etc/passwd must be listed in the /etc/shells file, except any shells specified for the purpose of preventing logins.

Information

The shells file lists approved default shells. It helps provide layered defense to the security approach by ensuring users cannot change their default shell to an unauthorized unsecure shell.

Solution

Use the 'chsh' utility or edit the /etc/passwd file and correct the error by changing the default shell of the account in error to an acceptable shell name contained in the /etc/shells file.

Example:
# chsh -s /bin/bash testuser

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-218352r603259_rule, STIG-ID|GEN002140, STIG-Legacy|SV-63671, STIG-Legacy|V-917, Vuln-ID|V-218352

Plugin: Unix

Control ID: dba43f19b01cb4882e386dc6c209401079d4c84bb3c2f70338429ebe3922ca3d