Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Bug 2228466
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
Bug List:
(2 of 2)
Bug 2228466
-
Please explain if "accounts_passwords_pam_faillock_interval" should apply to RHEL8.2+ or not [rhel-8.6.0.z]
Summary:
Please explain if "accounts_passwords_pam_faillock_interval" should apply to ...
Keywords
:
Triaged
ZStream
Status
:
VERIFIED
Alias:
None
Product:
Red Hat Enterprise Linux 8
Classification:
Red Hat
Component:
scap-security-guide
Sub Component:
---
Version:
8.7
Hardware:
All
OS:
Linux
Priority:
medium
Severity:
medium
Target Milestone:
rc
Target Release
:
---
Assignee:
Vojtech Polasek
QA Contact:
Milan Lysonek
Docs Contact:
URL:
Whiteboard:
Depends On:
2209073
Blocks:
TreeView+
depends on
/
blocked
Reported:
2023-08-02 12:22 UTC by
RHEL Program Management Team
Modified:
2023-08-17 15:25 UTC (
History
)
CC List:
7 users
(
show
)
ggasparb
jcerny
jjaburek
mhaicman
mlysonek
vpolasek
wsato
Fixed In Version:
scap-security-guide-0.1.69-1.el8_6
Doc Type:
Bug Fix
Doc Text:
.Faillock settings clarification in STIG profile Mapping of rule `accounts_passwords_pam_faillock_interval` has been clarified in the STIG profile. The rule now covers both RHEL-08-020012 and RHEL-08-020013.The reason for this change is that the rule `accounts_passwords_pam_faillock_interval` checks for `faillock` configuration in all of these three files: `/etc/pam.d/password-auth`, `/etc/pam.d/system-auth` and `/etc/security/faillock.conf`. The STIG ID RHEL-08-020012 checks just `/etc/pam.d/password-auth` and `/etc/pam.d/system-auth`. The STIG ID RHEL-08-020013 checks only `/etc/security/faillock.conf`. Therefore, the rule `accounts_passwords_pam_faillock_interval` covers both these STIG IDs.
Clone Of:
2209073
Environment:
Last Closed:
Type:
---
Target Upstream Version:
Embargoed:
Dependent Products:
Container Native Virtualization (CNV)
Ember-CSI
ExternalDNS Operator for OpenShift Container Platform
Kubernetes-native Infrastructure
OpenShift Container Platform
Red Hat Ceph Storage
Red Hat Certificate System
Red Hat CloudForms Management Engine
Red Hat Directory Server
Red Hat Enterprise MRG
Red Hat Enterprise Virtualization Manager
Red Hat Gluster Storage
Red Hat OpenShift Data Foundation
Red Hat OpenStack
Service Telemetry Framework
Attachments
(Terms of Use)
Links
System
ID
Private
Priority
Status
Summary
Last Updated
Red Hat Issue Tracker
RHELPLAN-164142
0
None
None
None
2023-08-02 12:23:34 UTC
Note
You need to
log in
before you can comment on or make changes to this bug.
Bug List:
(2 of 2)