-
Notifications
You must be signed in to change notification settings - Fork 712
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
accounts_umask_etc_bashrc is misaligned with RHEL 9 STIG #11937
Labels
productization-issue
Issue found in upstream stabilization process.
RHEL9
Red Hat Enterprise Linux 9 product related.
STIG
STIG Benchmark related.
Milestone
Comments
vojtapolasek
added
productization-issue
Issue found in upstream stabilization process.
RHEL9
Red Hat Enterprise Linux 9 product related.
STIG
STIG Benchmark related.
labels
May 3, 2024
I have found in the test logs in the ARF results that the Playbook creates this:
and the OVAL check accepts this as to pass the rule. |
Wow, that does not look like valid command, especially the second umask, right? |
yes, you're correct, the umask here isn't valid, there should be just three digits after the umask |
jan-cerny
added a commit
to jan-cerny/scap-security-guide
that referenced
this issue
May 6, 2024
Fix accounts_umask_etc_bashrc content misalignment with RHEL 9 DISA STIG. - Only valid umask values (3-digits) will match in OVAL - Do not concatenate original value with the new value in Ansible remediation - Add a regression test for ComplianceAsCode#11937 - Fix bash quoting in test scenario Fixes: ComplianceAsCode#11937
jan-cerny
added a commit
to jan-cerny/scap-security-guide
that referenced
this issue
May 7, 2024
Fix accounts_umask_etc_bashrc content misalignment with RHEL 9 DISA STIG. - Only valid umask values (3-digits) will match in OVAL - Do not concatenate original value with the new value in Ansible remediation - Add a regression test for ComplianceAsCode#11937 - Fix bash quoting in test scenario Fixes: ComplianceAsCode#11937
jan-cerny
added a commit
to jan-cerny/contest
that referenced
this issue
May 7, 2024
The issue ComplianceAsCode/content#11937 has been fixed by ComplianceAsCode/content#11946.
jan-cerny
added a commit
to jan-cerny/contest
that referenced
this issue
May 9, 2024
The issue ComplianceAsCode/content#11937 has been fixed by ComplianceAsCode/content#11946.
comps
pushed a commit
to RHSecurityCompliance/contest
that referenced
this issue
May 9, 2024
The issue ComplianceAsCode/content#11937 has been fixed by ComplianceAsCode/content#11946.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
productization-issue
Issue found in upstream stabilization process.
RHEL9
Red Hat Enterprise Linux 9 product related.
STIG
STIG Benchmark related.
Description of problem:
The rule accounts_umask_etc_bashrc is misaligned with its DISA counterpart.
The STIG is https://stigaview.com/products/rhel9/v1r3/RHEL-09-412055/
After remediating RHEL 9 with STIG Ansible playbook provided by the content repo and then using oscap to perform scan, the rule from the content repo is reported as "pass", while the rule within the SCAP file provided by DISA is reported as "fail".
The rule ID in the DISA file is xccdf_mil.disa.stig_rule_SV-258072r926203_rule.
SCAP Security Guide Version:
stabilization-v0.1.73, commit 0b096bc
External Content's Version:
DISA SCAP version is v1r1.
The text was updated successfully, but these errors were encountered: