- 发布:
- 2020-12-15
- 已更新:
- 2020-12-15
RHBA-2020:5451 - Bug Fix Advisory
概述
scap-security-guide bug fix and enhancement update
类型/严重性
Bug Fix Advisory
Red Hat Insights 补丁分析
识别并修复受此公告影响的系统。
标题
An update for scap-security-guide is now available for Red Hat Enterprise
Linux 7.
描述
The scap-security-guide project provides a guide for configuration of the
system from the final system's security point of view. The guidance is
specified in the Security Content Automation Protocol (SCAP) format and
constitutes a catalog of practical hardening advice, linked to government
requirements where applicable. The project bridges the gap between
generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
- The "DISA STIG for Red Hat Enterprise Linux 7" profile in the SCAP Security Guide has been updated to the latest version V3R1. This update adds more coverage and fixes reference problems. The profile is now also more stable and better aligns with the RHEL7 STIG benchmark provided by the Defense Information Systems Agency (DISA).
You should use only the current version of this profile because the older versions of this profile are no longer valid. The OVAL checks for several rules have changed, and scans using the V3R1 version will fail for systems that were hardened using older versions of SCAP Security Guide. You can fix the rules automatically by running the remediation with the new version of SCAP Security Guide.
WARNING: Automatic remediation might render the system non-functional. Run the remediation in a test environment first.
The following rules have been changed:
CCE-80224-9:: The default value of this SSHD configuration has changed from "delayed" to "yes". You must now provide a value according to recommendations. Check the rule description for information about fixing this problem or run the remediation to fix it automatically.
CCE-80393-2:: xccdf_org.ssgproject.content_rule_audit_rules_execution_chcon
CCE-80394-0:: xccdf_org.ssgproject.content_rule_audit_rules_execution_restorecon
CCE-80391-6:: xccdf_org.ssgproject.content_rule_audit_rules_execution_semanage
CCE-80660-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setfiles
CCE-80392-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setsebool
CCE-82362-5:: xccdf_org.ssgproject.content_rule_audit_rules_execution_seunshare
CCE-80398-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chage
CCE-80404-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chsh
CCE-80410-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_crontab
CCE-80397-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_gpasswd
CCE-80403-9:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_newgrp
CCE-80411-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_pam_timestamp_check
CCE-27437-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands
CCE-80395-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_passwd
CCE-80406-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_postdrop
CCE-80407-0:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_postqueue
CCE-80408-8:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_ssh_keysign
CCE-80402-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudoedit
CCE-80401-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudo
CCE-80400-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_su
CCE-80405-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_umount
CCE-80396-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_unix_chkpwd
CCE-80399-9:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_userhelper
(BZ#1665233)
解决方案
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
受影响的产品
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
- Red Hat Enterprise Linux Workstation 7 x86_64
- Red Hat Enterprise Linux Desktop 7 x86_64
- Red Hat Enterprise Linux for IBM z Systems 7 s390x
- Red Hat Enterprise Linux for Power, big endian 7 ppc64
- Red Hat Enterprise Linux for Scientific Computing 7 x86_64
- Red Hat Enterprise Linux for Power, little endian 7 ppc64le
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7 ppc64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64le
修复
- BZ - 1665233 - Latest RHEL7 STIG is not present in latest version of scap-security-guide. [rhel-7.9.z]
CVE
(none)
Red Hat Enterprise Linux Server 7
SRPM | |
---|---|
scap-security-guide-0.1.52-2.el7_9.src.rpm | SHA-256: 9c934fb0316f6289be99062eaf2ecbb3ee4634c75df3a113cbdda4f97afc753a |
x86_64 | |
scap-security-guide-0.1.52-2.el7_9.noarch.rpm | SHA-256: 22dd8807b02dd7fe641f48fdc937f3be7d612b7f29c1cd78a859f927fdb6b9ae |
scap-security-guide-doc-0.1.52-2.el7_9.noarch.rpm | SHA-256: accd7590a844ab14b41051b6ea0f3d6bc7e1b848e8c0ed58dda095ce2b1ac5fd |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 7
SRPM | |
---|---|
scap-security-guide-0.1.52-2.el7_9.src.rpm | SHA-256: 9c934fb0316f6289be99062eaf2ecbb3ee4634c75df3a113cbdda4f97afc753a |
x86_64 | |
scap-security-guide-0.1.52-2.el7_9.noarch.rpm | SHA-256: 22dd8807b02dd7fe641f48fdc937f3be7d612b7f29c1cd78a859f927fdb6b9ae |
scap-security-guide-doc-0.1.52-2.el7_9.noarch.rpm | SHA-256: accd7590a844ab14b41051b6ea0f3d6bc7e1b848e8c0ed58dda095ce2b1ac5fd |
Red Hat Enterprise Linux Workstation 7
SRPM | |
---|---|
scap-security-guide-0.1.52-2.el7_9.src.rpm | SHA-256: 9c934fb0316f6289be99062eaf2ecbb3ee4634c75df3a113cbdda4f97afc753a |
x86_64 | |
scap-security-guide-0.1.52-2.el7_9.noarch.rpm | SHA-256: 22dd8807b02dd7fe641f48fdc937f3be7d612b7f29c1cd78a859f927fdb6b9ae |
scap-security-guide-doc-0.1.52-2.el7_9.noarch.rpm | SHA-256: accd7590a844ab14b41051b6ea0f3d6bc7e1b848e8c0ed58dda095ce2b1ac5fd |
Red Hat Enterprise Linux Desktop 7
SRPM | |
---|---|
scap-security-guide-0.1.52-2.el7_9.src.rpm | SHA-256: 9c934fb0316f6289be99062eaf2ecbb3ee4634c75df3a113cbdda4f97afc753a |
x86_64 | |
scap-security-guide-0.1.52-2.el7_9.noarch.rpm | SHA-256: 22dd8807b02dd7fe641f48fdc937f3be7d612b7f29c1cd78a859f927fdb6b9ae |
scap-security-guide-doc-0.1.52-2.el7_9.noarch.rpm | SHA-256: accd7590a844ab14b41051b6ea0f3d6bc7e1b848e8c0ed58dda095ce2b1ac5fd |
Red Hat Enterprise Linux for IBM z Systems 7
SRPM | |
---|---|
scap-security-guide-0.1.52-2.el7_9.src.rpm | SHA-256: 9c934fb0316f6289be99062eaf2ecbb3ee4634c75df3a113cbdda4f97afc753a |
s390x | |
scap-security-guide-0.1.52-2.el7_9.noarch.rpm | SHA-256: 22dd8807b02dd7fe641f48fdc937f3be7d612b7f29c1cd78a859f927fdb6b9ae |
scap-security-guide-doc-0.1.52-2.el7_9.noarch.rpm | SHA-256: accd7590a844ab14b41051b6ea0f3d6bc7e1b848e8c0ed58dda095ce2b1ac5fd |
Red Hat Enterprise Linux for Power, big endian 7
SRPM | |
---|---|
scap-security-guide-0.1.52-2.el7_9.src.rpm | SHA-256: 9c934fb0316f6289be99062eaf2ecbb3ee4634c75df3a113cbdda4f97afc753a |
ppc64 | |
scap-security-guide-0.1.52-2.el7_9.noarch.rpm | SHA-256: 22dd8807b02dd7fe641f48fdc937f3be7d612b7f29c1cd78a859f927fdb6b9ae |
scap-security-guide-doc-0.1.52-2.el7_9.noarch.rpm | SHA-256: accd7590a844ab14b41051b6ea0f3d6bc7e1b848e8c0ed58dda095ce2b1ac5fd |
Red Hat Enterprise Linux for Scientific Computing 7
SRPM | |
---|---|
scap-security-guide-0.1.52-2.el7_9.src.rpm | SHA-256: 9c934fb0316f6289be99062eaf2ecbb3ee4634c75df3a113cbdda4f97afc753a |
x86_64 | |
scap-security-guide-0.1.52-2.el7_9.noarch.rpm | SHA-256: 22dd8807b02dd7fe641f48fdc937f3be7d612b7f29c1cd78a859f927fdb6b9ae |
scap-security-guide-doc-0.1.52-2.el7_9.noarch.rpm | SHA-256: accd7590a844ab14b41051b6ea0f3d6bc7e1b848e8c0ed58dda095ce2b1ac5fd |
Red Hat Enterprise Linux for Power, little endian 7
SRPM | |
---|---|
scap-security-guide-0.1.52-2.el7_9.src.rpm | SHA-256: 9c934fb0316f6289be99062eaf2ecbb3ee4634c75df3a113cbdda4f97afc753a |
ppc64le | |
scap-security-guide-0.1.52-2.el7_9.noarch.rpm | SHA-256: 22dd8807b02dd7fe641f48fdc937f3be7d612b7f29c1cd78a859f927fdb6b9ae |
scap-security-guide-doc-0.1.52-2.el7_9.noarch.rpm | SHA-256: accd7590a844ab14b41051b6ea0f3d6bc7e1b848e8c0ed58dda095ce2b1ac5fd |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7
SRPM | |
---|---|
scap-security-guide-0.1.52-2.el7_9.src.rpm | SHA-256: 9c934fb0316f6289be99062eaf2ecbb3ee4634c75df3a113cbdda4f97afc753a |
s390x | |
scap-security-guide-0.1.52-2.el7_9.noarch.rpm | SHA-256: 22dd8807b02dd7fe641f48fdc937f3be7d612b7f29c1cd78a859f927fdb6b9ae |
scap-security-guide-doc-0.1.52-2.el7_9.noarch.rpm | SHA-256: accd7590a844ab14b41051b6ea0f3d6bc7e1b848e8c0ed58dda095ce2b1ac5fd |
Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7
SRPM | |
---|---|
scap-security-guide-0.1.52-2.el7_9.src.rpm | SHA-256: 9c934fb0316f6289be99062eaf2ecbb3ee4634c75df3a113cbdda4f97afc753a |
ppc64 | |
scap-security-guide-0.1.52-2.el7_9.noarch.rpm | SHA-256: 22dd8807b02dd7fe641f48fdc937f3be7d612b7f29c1cd78a859f927fdb6b9ae |
scap-security-guide-doc-0.1.52-2.el7_9.noarch.rpm | SHA-256: accd7590a844ab14b41051b6ea0f3d6bc7e1b848e8c0ed58dda095ce2b1ac5fd |
Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7
SRPM | |
---|---|
scap-security-guide-0.1.52-2.el7_9.src.rpm | SHA-256: 9c934fb0316f6289be99062eaf2ecbb3ee4634c75df3a113cbdda4f97afc753a |
ppc64le | |
scap-security-guide-0.1.52-2.el7_9.noarch.rpm | SHA-256: 22dd8807b02dd7fe641f48fdc937f3be7d612b7f29c1cd78a859f927fdb6b9ae |
scap-security-guide-doc-0.1.52-2.el7_9.noarch.rpm | SHA-256: accd7590a844ab14b41051b6ea0f3d6bc7e1b848e8c0ed58dda095ce2b1ac5fd |
Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。