Bug 2169441
| Summary: | audit_rules_usergroup_modification_shadow don't remediate existing audit rule [rhel-9.1.0.z] | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | RHEL Program Management Team <pgm-rhel-tools> |
| Component: | scap-security-guide | Assignee: | Watson Yuuma Sato <wsato> |
| Status: | CLOSED ERRATA | QA Contact: | Milan Lysonek <mlysonek> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 9.1 | CC: | ggasparb, mhaicman, mlysonek, openscap-maint, qe-baseos-security, vpolasek, wsato |
| Target Milestone: | rc | Keywords: | AutoVerified, Triaged, ZStream |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | scap-security-guide-0.1.66-1.el9_1 | Doc Type: | Bug Fix |
| Doc Text: |
.Scans and remediations correctly ignore SCAP Audit rules Audit key
Previously, Audit watch rules defined without an Audit key (`-k` or `-F` key) would be marked as non-compliant even if other parts of the rule were correct. Moreover, Bash remediation would fix the path and permissions of the watch rule, but it would not add the key correctly. In addition, remediation sometimes did not fix the missing key, returning an `error` instead of a `fixed` value. This affected the following rules:
* `audit_rules_login_events`
* `audit_rules_login_events_faillock`
* `audit_rules_login_events_lastlog`
* `audit_rules_login_events_tallylog`
* `audit_rules_usergroup_modification`
* `audit_rules_usergroup_modification_group`
* `audit_rules_usergroup_modification_gshadow`
* `audit_rules_usergroup_modification_opasswd`
* `audit_rules_usergroup_modification_passwd`
* `audit_rules_usergroup_modification_shadow`
* `audit_rules_time_watch_localtime`
* `audit_rules_mac_modification`
* `audit_rules_networkconfig_modification`
* `audit_rules_sysadmin_actions`
* `audit_rules_session_events`
* `audit_rules_sudoers`
* `audit_rules_sudoers_d`
With this update, the key (represented by `-k` or `-F` key in the rule definition) has been removed from checks and from Bash and Ansible remediations. As a result, inconsistencies caused by the key field during checking and remediating no longer occur, and auditors can choose these keys arbitrarily to ease searching Audit logs.
|
Story Points: | --- |
| Clone Of: | 2120978 | Environment: | |
| Last Closed: | 2023-02-28 08:21:52 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2120978 | ||
| Bug Blocks: | |||
|
Comment 15
errata-xmlrpc
2023-02-28 08:21:52 UTC
|