Back to bug 2209073
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Red Hat Bugzilla | 2023-05-22 13:47:20 UTC | Pool ID | sst_security_compliance_rhel_8 | |
| Red Hat One Jira (issues.redhat.com) | 2023-05-22 13:49:17 UTC | Link ID | Red Hat Issue Tracker RHELPLAN-157851 | |
| Vojtech Polasek | 2023-05-29 14:45:22 UTC | Keywords | Triaged | |
| Vojtech Polasek | 2023-07-12 11:42:58 UTC | Status | NEW | ASSIGNED |
| Vojtech Polasek | 2023-07-18 08:03:21 UTC | Status | ASSIGNED | POST |
| Jan Černý | 2023-07-24 09:12:10 UTC | Doc Text | .Faillock settings clarification in STIG profile Mapping of rule accounts_passwords_pam_faillock_interval has been clarified in the STIG profile. The rule now covers both RHEL-08-020012 and RHEL-08-020013.The reason for this change in that accounts_passwords_pam_faillock_interval checks for `faillock` configuration in both `/etc/pam.d/password-auth`, `/etc/pam.d/system-auth` and `/etc/security/faillock.conf`. | |
| CC | jcerny | |||
| Doc Type | If docs needed, set a value | Bug Fix | ||
| Jiri Jaburek | 2023-07-28 13:41:53 UTC | Flags | needinfo?(vpolasek) | |
| CC | jjaburek, vpolasek | |||
| Vojtech Polasek | 2023-07-28 14:48:18 UTC | Flags | needinfo?(vpolasek) | |
| RHEL Program Management Team | 2023-08-02 12:22:22 UTC | Blocks | 2228465 | |
| RHEL Program Management Team | 2023-08-02 12:22:33 UTC | Blocks | 2228466 | |
| RHEL Program Management Team | 2023-08-02 12:22:40 UTC | Keywords | ZStream | |
| Matěj Týč | 2023-08-10 14:34:00 UTC | Fixed In Version | scap-security-guide-0.1.69-1.el8 | |
| Status | POST | MODIFIED | ||
| CC | matyc | |||
| Jan Černý | 2023-08-14 13:59:08 UTC | Doc Text | .Faillock settings clarification in STIG profile Mapping of rule accounts_passwords_pam_faillock_interval has been clarified in the STIG profile. The rule now covers both RHEL-08-020012 and RHEL-08-020013.The reason for this change in that accounts_passwords_pam_faillock_interval checks for `faillock` configuration in both `/etc/pam.d/password-auth`, `/etc/pam.d/system-auth` and `/etc/security/faillock.conf`. | .Faillock settings clarification in STIG profile Mapping of rule `accounts_passwords_pam_faillock_interval` has been clarified in the STIG profile. The rule now covers both RHEL-08-020012 and RHEL-08-020013.The reason for this change is that the rule `accounts_passwords_pam_faillock_interval` checks for `faillock` configuration in all of these three files: `/etc/pam.d/password-auth`, `/etc/pam.d/system-auth` and `/etc/security/faillock.conf`. The STIG ID RHEL-08-020012 checks just `/etc/pam.d/password-auth` and `/etc/pam.d/system-auth`. The STIG ID RHEL-08-020013 checks only `/etc/security/faillock.conf`. Therefore, the rule `accounts_passwords_pam_faillock_interval` covers both these STIG IDs. |
| errata-xmlrpc | 2023-08-17 20:20:49 UTC | Status | MODIFIED | ON_QA |
Back to bug 2209073