Bug 2228445

Summary: CIS profile flags the permissions on /boot/efi/EFI/redhat/user.cfg, but the permissions cannot be changed as directed [rhel-8.6.0.z]
Product: Red Hat Enterprise Linux 8 Reporter: RHEL Program Management Team <pgm-rhel-tools>
Component: scap-security-guideAssignee: Marcus Burghardt <maburgha>
Status: CLOSED ERRATA QA Contact: Milan Lysonek <mlysonek>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 8.7CC: dbodnarc, ggasparb, jcerny, jjaburek, libin.babu, maburgha, maynord.rosales, mhaicman, mlysonek, peter.vreman, vpolasek, wsato
Target Milestone: rcKeywords: Triaged, ZStream
Target Release: ---   
Hardware: Unspecified   
OS: Linux   
Whiteboard:
Fixed In Version: scap-security-guide-0.1.69-1.el8_6 Doc Type: Bug Fix
Doc Text:
Cause: Default permissions of uefi files were not accepted and were not possible to be changed via chmod when /boot/efi was using a vfat file system. Consequence: The file_permissions_efi_user_cfg rule was failing and the remediation was ineffective. Fix: Allow the "0700" permission for files in /boot/efi instead of only "0600". "0700" is the default permission and is accepted by CIS, so the assessment and remediation are now better aligned to CIS. Result: The file_permissions_efi_user_cfg rule should no longer fail if /boot/efi is mounted using the default permissions.
Story Points: ---
Clone Of: 2184487 Environment:
Last Closed: 2023-08-29 09:11:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2184487    
Bug Blocks:    

Comment 13 errata-xmlrpc 2023-08-29 09:11:56 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (scap-security-guide bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2023:4793