Back to bug 2157877

Who When What Removed Added
Red Hat Bugzilla 2023-01-03 11:38:45 UTC Pool ID sst_security_compliance_rhel_8
Red Hat One Jira (issues.redhat.com) 2023-01-03 11:40:53 UTC Link ID Red Hat Issue Tracker RHELPLAN-143535
Marcus Burghardt 2023-01-05 09:56:00 UTC CC maburgha
Keywords Triaged
Assignee vpolasek maburgha
Paulo Andrade 2023-01-18 16:23:18 UTC Flags needinfo?(maburgha)
Marcus Burghardt 2023-01-25 13:05:44 UTC Flags needinfo?(maburgha)
Status NEW ASSIGNED
Marcus Burghardt 2023-02-28 13:32:06 UTC Status ASSIGNED POST
Matěj Týč 2023-06-12 12:30:23 UTC CC matyc
Jan Černý 2023-07-19 07:37:02 UTC Doc Text .Better definition of interactive users

The rules in the `scap-security-guide` package now provide a consistent experience regarding interactive users configuration. Previously, various rules used different approaches for identifying interactive and non-interactive users. Starting from this release, we have unified the definitions of interactive users. Users accounts with the UID greater than or equal 1000 are now considered interactive, with the exception of `nobody` and `nfsnobody` user accounts and with the exception of user accounts that use `/sbin/nologin` as the login shell.

This change affects the following rules:

-accounts_umask_interactive_users
- accounts_user_dot_user_ownership
- accounts_user_dot_group_ownership
- accounts_user_dot_no_world_writable_programs
- accounts_user_interactive_home_directory_defined
- accounts_user_interactive_home_directory_exists
- accounts_users_home_files_groupownership
- accounts_users_home_files_ownership
- accounts_users_home_files_permissions
- file_groupownership_home_directories
- file_ownership_home_directories
- file_permissions_home_directories
- file_permissions_home_dirs
- no_forward_files
CC jcerny
Doc Type If docs needed, set a value Enhancement
Vojtech Polasek 2023-07-24 12:57:08 UTC CC vpolasek
Milan Lysonek 2023-07-27 13:47:17 UTC Doc Text .Better definition of interactive users

The rules in the `scap-security-guide` package now provide a consistent experience regarding interactive users configuration. Previously, various rules used different approaches for identifying interactive and non-interactive users. Starting from this release, we have unified the definitions of interactive users. Users accounts with the UID greater than or equal 1000 are now considered interactive, with the exception of `nobody` and `nfsnobody` user accounts and with the exception of user accounts that use `/sbin/nologin` as the login shell.

This change affects the following rules:

-accounts_umask_interactive_users
- accounts_user_dot_user_ownership
- accounts_user_dot_group_ownership
- accounts_user_dot_no_world_writable_programs
- accounts_user_interactive_home_directory_defined
- accounts_user_interactive_home_directory_exists
- accounts_users_home_files_groupownership
- accounts_users_home_files_ownership
- accounts_users_home_files_permissions
- file_groupownership_home_directories
- file_ownership_home_directories
- file_permissions_home_directories
- file_permissions_home_dirs
- no_forward_files
.Better definition of interactive users

The rules in the `scap-security-guide` package now provide a consistent experience regarding interactive users configuration. Previously, various rules used different approaches for identifying interactive and non-interactive users. Starting from this release, we have unified the definitions of interactive users. Users accounts with the UID greater than or equal 1000 are now considered interactive, with the exception of `nobody` and `nfsnobody` user accounts and with the exception of user accounts that use `/sbin/nologin` as the login shell.

This change affects the following rules:

- accounts_umask_interactive_users
- accounts_user_dot_user_ownership
- accounts_user_dot_group_ownership
- accounts_user_dot_no_world_writable_programs
- accounts_user_interactive_home_directory_defined
- accounts_user_interactive_home_directory_exists
- accounts_users_home_files_groupownership
- accounts_users_home_files_ownership
- accounts_users_home_files_permissions
- file_groupownership_home_directories
- file_ownership_home_directories
- file_permissions_home_directories
- file_permissions_home_dirs
- no_forward_files
RHEL Program Management Team 2023-08-02 12:07:08 UTC Blocks 2228433
RHEL Program Management Team 2023-08-02 12:07:19 UTC Blocks 2228434
RHEL Program Management Team 2023-08-02 12:07:26 UTC Keywords ZStream
Milan Lysonek 2023-08-10 14:37:33 UTC Fixed In Version scap-security-guide-0.1.69-1.el8
Status POST MODIFIED
Jiri Jaburek 2023-08-14 11:26:36 UTC CC jjaburek
AutoMiloš 2023-08-14 13:34:44 UTC Keywords AutoVerified

Back to bug 2157877