Bug 2176008
| Summary: | "Add xxx Option to /var/log" and "Add xxx Option to /var/log/audit" should return "notapplicable" when no dedicated mount point is used | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Renaud Métrich <rmetrich> | |
| Component: | scap-security-guide | Assignee: | Vojtech Polasek <vpolasek> | |
| Status: | CLOSED ERRATA | QA Contact: | Milan Lysonek <mlysonek> | |
| Severity: | low | Docs Contact: | Jan Fiala <jafiala> | |
| Priority: | low | |||
| Version: | 8.7 | CC: | ggasparb, jafiala, jcerny, jjaburek, matyc, mhaicman, mlysonek, peter.vreman, ravpatil, vpolasek, wsato | |
| Target Milestone: | rc | Keywords: | AutoVerified, Triaged, ZStream | |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
|
| Hardware: | All | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | scap-security-guide-0.1.69-1.el8 | Doc Type: | Bug Fix | |
| Doc Text: |
.SCAP rules now correctly evaluate whether the `/var/log` and `/var/log/audit` partitions exist
Previously, some SCAP rules relevant to the `/var/log` and `/var/log/audit` partitions were evaluated and remediated even when the appropriate disk partition did not exist. This affected the following rules:
* `mount_option_var_log_audit_nodev`
* `mount_option_var_log_audit_noexec`
* `mount_option_var_log_audit_nosuid`
* `mount_option_var_log_nodev`
* `mount_option_var_log_noexec`
* `mount_option_var_log_nosuid`
As a consequence, these rules were evaluated and incorrectly reported as failing in the final report even when the directories `/var/log` or `/var/log/audit` were not mount points for individual partitions. This update adds an applicability check to determine whether `/var/log` or `/var/log/audit` are mount points for individual partitions. As a consequence, the rules are not evaluated in configurations when the directories are not mount points for individual partitions and the rules are marked as `notapplicable` in the final report.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 2228473 2228474 (view as bug list) | Environment: | ||
| Last Closed: | 2023-11-14 15:36:38 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2228473, 2228474 | |||
|
Description
Renaud Métrich
2023-03-07 06:57:24 UTC
In upstream, a "mount" applicability platform has been introduced by https://github.com/ComplianceAsCode/content/pull/10431. This platform has been added to rules for /tmp and /var/tmp mount options. What remains to be done there is to add the "mount" platform to the rules concerning /var/log and /var/log/audit, and also possibly to all other similar rules where it would make sense, as suggested in https://github.com/ComplianceAsCode/content/issues/10504. A PR that introduces mount platforms to other rules has been merged to upstream: https://github.com/ComplianceAsCode/content/pull/10794 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (scap-security-guide bug fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:7056 |