Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
.The RHEL 7 STIG security profile updated to version V3R1
With the link:https://access.redhat.com/errata/RHBA-2020:5451[RHBA-2020:5451] advisory, the `DISA STIG for Red Hat Enterprise Linux 7` profile in the SCAP Security Guide has been updated to the latest version `V3R1`. This update adds more coverage and fixes reference problems. The profile is now also more stable and better aligns with the RHEL7 STIG benchmark provided by the Defense Information Systems Agency (DISA).
You should use only the current version of this profile because the older versions of this profile are no longer valid. The OVAL checks for several rules have changed, and scans using the `V3R1` version will fail for systems that were hardened using older versions of SCAP Security Guide. You can fix the rules automatically by running the remediation with the new version of SCAP Security Guide.
WARNING: Automatic remediation might render the system non-functional. Run the remediation in a test environment first.
The following rules have been changed:
CCE-80224-9:: The default value of this SSHD configuration has changed from `delayed` to `yes`. You must now provide a value according to recommendations. Check the rule description for information about fixing this problem or run the remediation to fix it automatically.
CCE-80393-2:: xccdf_org.ssgproject.content_rule_audit_rules_execution_chcon
CCE-80394-0:: xccdf_org.ssgproject.content_rule_audit_rules_execution_restorecon
CCE-80391-6:: xccdf_org.ssgproject.content_rule_audit_rules_execution_semanage
CCE-80660-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setfiles
CCE-80392-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setsebool
CCE-82362-5:: xccdf_org.ssgproject.content_rule_audit_rules_execution_seunshare
CCE-80398-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chage
CCE-80404-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chsh
CCE-80410-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_crontab
CCE-80397-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_gpasswd
CCE-80403-9:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_newgrp
CCE-80411-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_pam_timestamp_check
CCE-27437-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands
CCE-80395-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_passwd
CCE-80406-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_postdrop
CCE-80407-0:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_postqueue
CCE-80408-8:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_ssh_keysign
CCE-80402-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudoedit
CCE-80401-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudo
CCE-80400-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_su
CCE-80405-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_umount
CCE-80396-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_unix_chkpwd
CCE-80399-9:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_userhelper
DescriptionJaskaran Singh Narula
2019-01-10 17:51:20 UTC
Description of problem:
It is researched and found the link where it is mentioned that DISA directly ships V2 R1 for RHEL 7 profile from IASE but not from Red Hat.
>> https://access.redhat.com/articles/2918071
Under the link, I found >> https://iase.disa.mil/stigs/os/unix-linux/Pages/red-hat.aspx
Version-Release number of selected component (if applicable):
scap-security-guide-0.1.40-12.el7
How reproducible:
Steps to Reproduce:
1.
2.
3.
Actual results:
No STIG for RHEL 7 V2 R1 present.
Expected results:
STIG for RHL 7 V2 R1 in scap-security-gude.
Additional info:
Comment 15Gabriel Gaspar Becker
2020-10-06 15:29:37 UTC
(In reply to Pablo Hess from comment #14)
> I see DISA STIG v2r8 was added upstream 3 days ago
> (https://github.com/ComplianceAsCode/content/commit/
> a2d23c9e646fb1e0d670a142b0a43ed055d004fa#diff-
> 1d36a525916ee28ef8d16a52a25659c4).
>
> Can we expect the Red Hat-shipped scap-security-guide package to incorporate
> this update anytime soon?
>
> Thanks.
There is a plan to update the package scap-security-guide with the latest upstream version of DISA STIG v2r8 as you mentioned. You can follow the development of this bugzilla to know its progress.
Comment 16Gabriel Gaspar Becker
2020-10-06 15:31:32 UTC
Update title with latest DISA STIG version (V2R8) available.
Red Hat Enterprise Linux 7 shipped it's final minor release on September 29th, 2020. 7.9 was the last minor releases scheduled for RHEL 7.
From intial triage it does not appear the remaining Bugzillas meet the inclusion criteria for Maintenance Phase 2 and will now be closed.
From the RHEL life cycle page:
https://access.redhat.com/support/policy/updates/errata#Maintenance_Support_2_Phase
"During Maintenance Support 2 Phase for Red Hat Enterprise Linux version 7,Red Hat defined Critical and Important impact Security Advisories (RHSAs) and selected (at Red Hat discretion) Urgent Priority Bug Fix Advisories (RHBAs) may be released as they become available."
If this BZ was closed in error and meets the above criteria please re-open it flag for 7.9.z, provide suitable business and technical justifications, and follow the process for Accelerated Fixes:
https://source.redhat.com/groups/public/pnt-cxno/pnt_customer_experience_and_operations_wiki/support_delivery_accelerated_fix_release_handbook
Feature Requests can re-opened and moved to RHEL 8 if the desired functionality is not already present in the product.
Please reach out to the applicable Product Experience Engineer[0] if you have any questions or concerns.
[0] https://bugzilla.redhat.com/page.cgi?id=agile_component_mapping.html&product=Red+Hat+Enterprise+Linux+7
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.
For information on the advisory (scap-security-guide bug fix and enhancement update), and where to find the updated
files, follow the link below.
If the solution does not work for you, open a new bug report.
https://access.redhat.com/errata/RHBA-2020:5451