Bug 2228465 - Please explain if "accounts_passwords_pam_faillock_interval" should apply to RHEL8.2+ or not [rhel-8.8.0.z]
Summary: Please explain if "accounts_passwords_pam_faillock_interval" should apply to ...
Keywords:
Status: MODIFIED
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: scap-security-guide
Version: 8.7
Hardware: All
OS: Linux
medium
medium
Target Milestone: rc
: ---
Assignee: Vojtech Polasek
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On: 2209073
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-08-02 12:22 UTC by RHEL Program Management Team
Modified: 2023-08-11 12:41 UTC (History)
8 users (show)

Fixed In Version: scap-security-guide-0.1.69-1.el8_8
Doc Type: Bug Fix
Doc Text:
.Faillock settings clarification in STIG profile Mapping of rule accounts_passwords_pam_faillock_interval has been clarified in the STIG profile. The rule now covers both RHEL-08-020012 and RHEL-08-020013.The reason for this change in that accounts_passwords_pam_faillock_interval checks for `faillock` configuration in both `/etc/pam.d/password-auth`, `/etc/pam.d/system-auth` and `/etc/security/faillock.conf`.
Clone Of: 2209073
Environment:
Last Closed:
Type: ---
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHELPLAN-164141 0 None None None 2023-08-02 12:23:25 UTC


Note You need to log in before you can comment on or make changes to this bug.