Bug 1603347
| Summary: | double chdir/chroot in probe rpmverifypackage | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Matus Marhefka <mmarhefk> | ||||
| Component: | openscap | Assignee: | Jan Černý <jcerny> | ||||
| Status: | CLOSED WONTFIX | QA Contact: | BaseOS QE Security Team <qe-baseos-security> | ||||
| Severity: | medium | Docs Contact: | Mirek Jahoda <mjahoda> | ||||
| Priority: | medium | ||||||
| Version: | 7.6 | CC: | jcerny, mhaicman, mjahoda, mmarhefk, openscap-maint, wsato | ||||
| Target Milestone: | alpha | ||||||
| Target Release: | --- | ||||||
| Hardware: | Unspecified | ||||||
| OS: | Unspecified | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Known Issue | |||||
| Doc Text: |
*OpenSCAP* `rpmverifypackage` does not work correctly
The `chdir` and `chroot` system calls are called twice by the `rpmverifypackage` probe. Consequently, an error occurs when the probe is utilized during an *OpenSCAP* scan with custom Open Vulnerability and Assessment Language (OVAL) content.
To work around this problem, do not use the `rpmverifypackage_test` OVAL test in your content or use only the content from the _scap-security-guide_ package where `rpmverifypackage_test` is not used.
|
Story Points: | --- | ||||
| Clone Of: | |||||||
| : | 1646197 (view as bug list) | Environment: | |||||
| Last Closed: | 2019-03-12 14:32:36 UTC | Type: | Bug | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | |||||||
| Bug Blocks: | 1646197 | ||||||
| Attachments: |
|
||||||
|
Description
Matus Marhefka
2018-07-19 14:29:58 UTC
Created attachment 1460350 [details]
probe_test_rpm.oval.xml
Upstream issue: https://github.com/OpenSCAP/openscap/issues/1173 This issue was not selected to be included in Red Hat Enterprise Linux 7.7 because it is seen either as low or moderate impact to a small number of use-cases. The next release will be in Maintenance Support 1 Phase, which means that qualified Critical and Important Security errata advisories (RHSAs) and Urgent Priority Bug Fix errata advisories (RHBAs) may be released as they become available. We will now close this issue, but if you believe that it qualifies for the Maintenance Support 1 Phase, please re-open; otherwise, we recommend moving the request to Red Hat Enterprise Linux 8 if applicable. |