Bug 2000264

Summary: oscap scans for xccdf_org.ssgproject.content_profile_ospp profile incorrectly flags 11-loginuid.rules and 30-ospp-v42.rules as altered if 10-base-config.rules is changed
Product: Red Hat Enterprise Linux 8 Reporter: Lark Gordon <lagordon>
Component: scap-security-guideAssignee: Vojtech Polasek <vpolasek>
Status: CLOSED ERRATA QA Contact: Milan Lysonek <mlysonek>
Severity: low Docs Contact: Khushbu Borole <kborole>
Priority: unspecified    
Version: 8.4CC: ggasparb, jafiala, maburgha, matyc, mhaicman, mlysonek, peter.vreman, wsato
Target Milestone: rcKeywords: Triaged
Target Release: ---   
Hardware: Unspecified   
OS: Linux   
Fixed In Version: scap-security-guide-0.1.60-2.el8 Doc Type: Bug Fix
Doc Text:
.Files in `/usr/share/audit/sample-rules` are now accepted by SCAP rules Previously, according to the description of SCAP rules `xccdf_org.ssgproject.content_rule_audit_ospp_general` and `xccdf_org.ssgproject.content_rule_audit_immutable_login_uids`, users were able to make systems compliant by copying appropriate files from the `/usr/share/audit/sample-rules` directory. However, OVAL checks of these rules failed, and the system was consequently marked as non-compliant after the scan. With this update, the OVAL checks now accept the files from `/usr/share/audit/sample-rules`, and the SCAP rules pass successfully.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-05-10 14:14:34 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Lark Gordon 2021-09-01 17:32:03 UTC
Description of problem:

oscap scans reports that 30-ospp-v42.rules and 11-loginuid.rules do not match the sample rules in /usr/share/audit/sample-rules if 10-base-config.rules has been changed.

Version-Release number of selected component (if applicable):


How reproducible:
Easily reproducible if  10-base-config.rules. The customer needs to change the buffer size but sees other rules are also flagged whenever they change that file.

Steps to Reproduce:
1. Copy the files from /usr/share/audit/sample-rules to /etc/audit/rules.d/ and make some change to a file (in this case the customer is editing 10-base-config.rules).

2. Scan the system with oscap using the xccdf_org.ssgproject.content_profile_ospp profile from /usr/share/xml/scap/ssg/content/ssg-rhel8-ds.xml

3. The scan shows that 10-base-config.rules is changed (expected) as well as 30-ospp-v42.rules and 11-loginuid.rules (not expected).

Actual results:
The scan shows that 10-base-config.rules is changed (expected) as well as 30-ospp-v42.rules and 11-loginuid.rules (not expected) if 10-base-config.rules is changed.

Expected results:
The scan should only fail 10-base-config.rules since these files are all checked individually.

Comment 3 Vojtech Polasek 2022-01-12 08:05:26 UTC
Fixed upstream:

Comment 13 Watson Yuuma Sato 2022-02-11 16:17:12 UTC

Comment 27 errata-xmlrpc 2022-05-10 14:14:34 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (scap-security-guide bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.