Bug 1754919
| Summary: | Audit rules error when remediating machine to PCI-DSS profile | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Matus Marhefka <mmarhefk> |
| Component: | scap-security-guide | Assignee: | Watson Yuuma Sato <wsato> |
| Status: | CLOSED ERRATA | QA Contact: | Matěj Týč <matyc> |
| Severity: | high | Docs Contact: | Mirek Jahoda <mjahoda> |
| Priority: | high | ||
| Version: | 8.1 | CC: | ggasparb, jcerny, matyc, mhaicman, mjahoda, mlysonek, openscap-maint, qe-baseos-security, vpolasek, wsato |
| Target Milestone: | rc | Flags: | pm-rhel:
mirror+
|
| Target Release: | 8.2 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | scap-security-guide-0.1.46-2.el8 | Doc Type: | Bug Fix |
| Doc Text: |
.`scap-security-guide` PCI-DSS remediations of Audit rules now work properly
Previously, the `scap-security-guide` package contained a combination of remediation and a check that could result in one of the following scenarios:
* incorrect remediation of Audit rules
* scan evaluation containing false positives where passed rules were marked as failed
Consequently, during the RHEL installation process, scanning of the installed system reported some Audit rules as either failed or errored.
With this update, the remediations have been fixed, and scanning of the system installed with the PCI-DSS security policy no longer reports false positives for Audit rules.
|
Story Points: | --- |
| Clone Of: | 1754550 | Environment: | |
| Last Closed: | 2020-04-28 15:30:41 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1754550 | ||
| Bug Blocks: | |||
|
Description
Matus Marhefka
2019-09-24 11:19:12 UTC
Following PR fixes one of the issues in the shared/bash_remediation_functions/fix_audit_syscall_rule.sh: https://github.com/ComplianceAsCode/content/pull/4791 PR https://github.com/ComplianceAsCode/content/pull/4886 fixes rule: xccdf_org.ssgproject.content_rule_audit_rules_login_events PR https://github.com/ComplianceAsCode/content/pull/4888 fixes evaluation of rule: xccdf_org.ssgproject.content_rule_audit_rules_unsuccessful_file_modification Which started to fail with merge of https://github.com/ComplianceAsCode/content/pull/4791 This PR is also important to fix the audit bash functions: https://github.com/ComplianceAsCode/content/pull/4881 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:1583 |