Bug 1404398 - variable ssg-var_etc_init_d_functions_umask_as_number is decimal, and it confuses users
Summary: variable ssg-var_etc_init_d_functions_umask_as_number is decimal, and it conf...
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: scap-security-guide
Version: 7.3
Hardware: Unspecified
OS: Unspecified
low
low
Target Milestone: rc
: ---
Assignee: Watson Yuuma Sato
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-12-13 18:21 UTC by Marek Haicman
Modified: 2019-03-12 16:15 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-03-12 16:15:51 UTC
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Bugzilla 1403347 1 None None None 2021-01-20 06:05:38 UTC

Internal Links: 1403347

Description Marek Haicman 2016-12-13 18:21:37 UTC
Description of problem:
Variable ssg-var_etc_init_d_functions_umask_as_number is storing umask in decimal form, so it can be numerically compared to the umask in the guide. Unfortunately this value is shown in the report, and it's confusing to the user [as user expects 022 and not 18].

Version-Release number of selected component (if applicable):
scap-security-guide-0.1.30-3.el7.noarch

How reproducible:
reliably

Steps to Reproduce:
1. perform scan with rule xccdf_org.ssgproject.content_group_daemon_umask
2. see results
3. Show all result details

Actual results:
Value of umask on the machine is printed in decimal 

Expected results:
Umask is printed in octal

Additional info:
String comparison instead?

Comment 2 Marek Haicman 2019-03-12 16:15:51 UTC
This issue was not selected to be included in Red Hat Enterprise Linux 7.7 because it is seen either as low or moderate impact to a small number of use-cases. The next release will be in Maintenance Support 1 Phase, which means that qualified Critical and Important Security errata advisories (RHSAs) and Urgent Priority Bug Fix errata advisories (RHBAs) may be released as they become available. We will now close this issue, but if you believe that it qualifies for the Maintenance Support 1 Phase, please re-open; otherwise, we recommend moving the request to Red Hat Enterprise Linux 8 if applicable.


Note You need to log in before you can comment on or make changes to this bug.