Bug 1939295
| Summary: | /var/lib/chrony permissions triggering enterprise security scanners | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | peter.clark |
| Component: | chrony | Assignee: | Miroslav Lichvar <mlichvar> |
| Status: | CLOSED ERRATA | QA Contact: | Ondrej Mejzlik <omejzlik> |
| Severity: | low | Docs Contact: | Prerana Sharma <presharm> |
| Priority: | medium | ||
| Version: | CentOS Stream | CC: | bstinson, carl, jwboyer, omejzlik |
| Target Milestone: | rc | Keywords: | Triaged |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | chrony-4.1-1.el8 | Doc Type: | Bug Fix |
| Doc Text: |
.Permissions of the `/var/lib/chrony` have changed
Previously, enterprise security scanners would flag the `/var/lib/chrony` directory for having world-readable and executable permissions. With this update, the permissions of the `/var/lib/chrony` directory have changed to limit access only to the root and chrony users.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2021-11-09 19:51:57 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
peter.clark
2021-03-16 00:21:04 UTC
This should be fixed with rebase to 4.0, which can save to that directory more sensitive files, like NTS keys and cookies. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (chrony bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2021:4462 |