RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1665233 - Latest RHEL7 STIG is not present in latest version of scap-security-guide. [rhel-7.9.z]
Summary: Latest RHEL7 STIG is not present in latest version of scap-security-guide. [r...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: scap-security-guide
Version: 7.6
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: rc
: ---
Assignee: Gabriel Gaspar Becker
QA Contact: Milan Lysonek
Jan Fiala
URL:
Whiteboard:
: 1673665 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-01-10 17:51 UTC by Jaskaran Singh Narula
Modified: 2024-03-25 15:11 UTC (History)
13 users (show)

Fixed In Version: scap-security-guide-0.1.52-2.el7_9
Doc Type: Enhancement
Doc Text:
.The RHEL 7 STIG security profile updated to version V3R1 With the link:https://access.redhat.com/errata/RHBA-2020:5451[RHBA-2020:5451] advisory, the `DISA STIG for Red Hat Enterprise Linux 7` profile in the SCAP Security Guide has been updated to the latest version `V3R1`. This update adds more coverage and fixes reference problems. The profile is now also more stable and better aligns with the RHEL7 STIG benchmark provided by the Defense Information Systems Agency (DISA). You should use only the current version of this profile because the older versions of this profile are no longer valid. The OVAL checks for several rules have changed, and scans using the `V3R1` version will fail for systems that were hardened using older versions of SCAP Security Guide. You can fix the rules automatically by running the remediation with the new version of SCAP Security Guide. WARNING: Automatic remediation might render the system non-functional. Run the remediation in a test environment first. The following rules have been changed: CCE-80224-9:: The default value of this SSHD configuration has changed from `delayed` to `yes`. You must now provide a value according to recommendations. Check the rule description for information about fixing this problem or run the remediation to fix it automatically. CCE-80393-2:: xccdf_org.ssgproject.content_rule_audit_rules_execution_chcon CCE-80394-0:: xccdf_org.ssgproject.content_rule_audit_rules_execution_restorecon CCE-80391-6:: xccdf_org.ssgproject.content_rule_audit_rules_execution_semanage CCE-80660-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setfiles CCE-80392-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setsebool CCE-82362-5:: xccdf_org.ssgproject.content_rule_audit_rules_execution_seunshare CCE-80398-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chage CCE-80404-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chsh CCE-80410-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_crontab CCE-80397-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_gpasswd CCE-80403-9:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_newgrp CCE-80411-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_pam_timestamp_check CCE-27437-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands CCE-80395-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_passwd CCE-80406-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_postdrop CCE-80407-0:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_postqueue CCE-80408-8:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_ssh_keysign CCE-80402-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudoedit CCE-80401-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudo CCE-80400-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_su CCE-80405-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_umount CCE-80396-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_unix_chkpwd CCE-80399-9:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_userhelper
Clone Of:
Environment:
Last Closed: 2020-12-15 11:20:17 UTC
Target Upstream Version:
Embargoed:
lcervako: mirror+


Attachments (Terms of Use)
STIG HTML report (Server variant) (3.35 MB, application/xhtml+xml)
2020-12-04 14:29 UTC, Milan Lysonek
no flags Details
STIG HTML report (Server with GUI variant) (3.38 MB, application/xhtml+xml)
2020-12-04 14:31 UTC, Milan Lysonek
no flags Details


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2020:5451 0 None None None 2020-12-15 11:20:21 UTC

Description Jaskaran Singh Narula 2019-01-10 17:51:20 UTC
Description of problem:

It is researched and found the link where it is mentioned that DISA directly ships V2 R1 for RHEL 7 profile from IASE but not from Red Hat. 

  >> https://access.redhat.com/articles/2918071

Under the link, I found >> https://iase.disa.mil/stigs/os/unix-linux/Pages/red-hat.aspx

Version-Release number of selected component (if applicable):
scap-security-guide-0.1.40-12.el7

How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:
No STIG for RHEL 7 V2 R1 present. 

Expected results:
STIG for RHL 7 V2 R1 in scap-security-gude. 

Additional info:

Comment 2 Shawn Wells 2019-01-11 18:56:27 UTC
Engineering committed to shipping this as part of RHEL 8 GA.

Has that changed?

Comment 3 Shawn Wells 2019-01-11 18:58:27 UTC
edit: RHEL 8 GA *and* next RHEL 7 rebase

Comment 5 Marek Haicman 2019-03-12 19:19:16 UTC
*** Bug 1673665 has been marked as a duplicate of this bug. ***

Comment 14 Pablo Hess 2020-09-21 14:39:50 UTC
I see DISA STIG v2r8 was added upstream 3 days ago (https://github.com/ComplianceAsCode/content/commit/a2d23c9e646fb1e0d670a142b0a43ed055d004fa#diff-1d36a525916ee28ef8d16a52a25659c4).

Can we expect the Red Hat-shipped scap-security-guide package to incorporate this update anytime soon?

Thanks.

Comment 15 Gabriel Gaspar Becker 2020-10-06 15:29:37 UTC
(In reply to Pablo Hess from comment #14)
> I see DISA STIG v2r8 was added upstream 3 days ago
> (https://github.com/ComplianceAsCode/content/commit/
> a2d23c9e646fb1e0d670a142b0a43ed055d004fa#diff-
> 1d36a525916ee28ef8d16a52a25659c4).
> 
> Can we expect the Red Hat-shipped scap-security-guide package to incorporate
> this update anytime soon?
> 
> Thanks.

There is a plan to update the package scap-security-guide with the latest upstream version of DISA STIG v2r8 as you mentioned. You can follow the development of this bugzilla to know its progress.

Comment 16 Gabriel Gaspar Becker 2020-10-06 15:31:32 UTC
Update title with latest DISA STIG version (V2R8) available.

Comment 22 Chris Williams 2020-11-11 21:42:27 UTC
Red Hat Enterprise Linux 7 shipped it's final minor release on September 29th, 2020. 7.9 was the last minor releases scheduled for RHEL 7.
From intial triage it does not appear the remaining Bugzillas meet the inclusion criteria for Maintenance Phase 2 and will now be closed. 

From the RHEL life cycle page:
https://access.redhat.com/support/policy/updates/errata#Maintenance_Support_2_Phase
"During Maintenance Support 2 Phase for Red Hat Enterprise Linux version 7,Red Hat defined Critical and Important impact Security Advisories (RHSAs) and selected (at Red Hat discretion) Urgent Priority Bug Fix Advisories (RHBAs) may be released as they become available."

If this BZ was closed in error and meets the above criteria please re-open it flag for 7.9.z, provide suitable business and technical justifications, and follow the process for Accelerated Fixes:
https://source.redhat.com/groups/public/pnt-cxno/pnt_customer_experience_and_operations_wiki/support_delivery_accelerated_fix_release_handbook  

Feature Requests can re-opened and moved to RHEL 8 if the desired functionality is not already present in the product. 

Please reach out to the applicable Product Experience Engineer[0] if you have any questions or concerns.  

[0] https://bugzilla.redhat.com/page.cgi?id=agile_component_mapping.html&product=Red+Hat+Enterprise+Linux+7

Comment 24 Chris Williams 2020-11-11 23:16:36 UTC
Apologies for the inadvertent closure.

Comment 41 Milan Lysonek 2020-12-04 14:29:21 UTC
Created attachment 1736423 [details]
STIG HTML report (Server variant)

Comment 42 Milan Lysonek 2020-12-04 14:31:06 UTC
Created attachment 1736425 [details]
STIG HTML report (Server with GUI variant)

Comment 44 Milan Lysonek 2020-12-07 17:04:33 UTC
Verified for scap-security-guide-0.1.52-2.el7_9 based on comment 43.

Comment 48 errata-xmlrpc 2020-12-15 11:20:17 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (scap-security-guide bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2020:5451


Note You need to log in before you can comment on or make changes to this bug.