- Issued:
 - 2023-11-14
 - Updated:
 - 2023-11-14
 
RHBA-2023:7056 - Bug Fix Advisory
Synopsis
scap-security-guide bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for scap-security-guide is now available for Red Hat Enterprise Linux
8.
Description
For detailed information on changes in this release, see the Red Hat Enterprise
Linux %s Release Notes linked from the References section.
Solution
For details on how to apply this update, which includes the changes described
in this advisory, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
 - Red Hat Enterprise Linux for IBM z Systems 8 s390x
 - Red Hat Enterprise Linux for Power, little endian 8 ppc64le
 - Red Hat Enterprise Linux for ARM 64 8 aarch64
 
Fixes
- BZ - 2129100 - After provisioning with ospp profile remediation, enable_fips_mode fails on s390x
 - BZ - 2130181 - FIPS enabled profiles built in offline mode with image-builder won't boot
 - BZ - 2130182 - Login issues after anssi profile remediation with image-builder images
 - BZ - 2130185 - Offline remediation of fstab permissions fails in Image Builder
 - BZ - 2155789 - Update ANSSI BP-028 in RHEL8 to v2.0
 - BZ - 2157877 - Definition of interactive an non interactive users
 - BZ - 2167999 - content_rule_audit_rules_login_events_faillock not selected on DISA STIG Profile
 - BZ - 2169857 - Applying CIS benchmark fix cause systemd-journald to unable to parse configuration file
 - BZ - 2170530 - xccdf_org.ssgproject.content_rule_postfix_prevent_unrestricted_relay should allow whitespace in "smtpd_client_restrictions" value
 - BZ - 2175684 - AIDE compliancy
 - BZ - 2175882 - scap results should be clear about what values are acceptable for "pam faillock deny" and "pam faillock interval".
 - BZ - 2176008 - "Add xxx Option to /var/log" and "Add xxx Option to /var/log/audit" should return "notapplicable" when no dedicated mount point is used
 - BZ - 2178516 - Fix CCE link in compliance issue description
 - BZ - 2178740 - system account with uid >= 1000 is badly detected as user interactive account
 - BZ - 2184487 - CIS profile flags the permissions on /boot/efi/EFI/redhat/user.cfg, but the permissions cannot be changed as directed
 - BZ - 2192893 - ".include =" in rhel8-playbook-stig.yml causing STIG to flag it.
 - BZ - 2209073 - Please explain if "accounts_passwords_pam_faillock_interval" should apply to RHEL8.2+ or not
 - BZ - 2221695 - Rebase scap-security-guide in Red Hat Enterprise Linux 8.9 to latest upstream version
 - BZ - 2222583 - Remote resource referenced from datastream is missing https://access.redhat.com/security/data/oval/com.redhat.rhsa-RHEL8.xml.bz2
 
CVEs
(none)
  
  Note:
  
  More recent versions of these packages may be available.
  Click a package name for more details.
Red Hat Enterprise Linux for x86_64 8
| SRPM | |
|---|---|
| scap-security-guide-0.1.69-2.el8.src.rpm | SHA-256: c1c544ea16192deb52ebded7ca29d3f4bbfc5a8c3d4145f3c86a278702f3fe90 | 
| x86_64 | |
| scap-security-guide-0.1.69-2.el8.noarch.rpm | SHA-256: 8b8ec03574375220a7412384bcf85a5481d6693fbdfeb4af00aacea2672e7209 | 
| scap-security-guide-doc-0.1.69-2.el8.noarch.rpm | SHA-256: ecf20addf367ca8c80fccf290dd63138b8bd7ec674c81cf8c93a360a1399b339 | 
Red Hat Enterprise Linux for IBM z Systems 8
| SRPM | |
|---|---|
| scap-security-guide-0.1.69-2.el8.src.rpm | SHA-256: c1c544ea16192deb52ebded7ca29d3f4bbfc5a8c3d4145f3c86a278702f3fe90 | 
| s390x | |
| scap-security-guide-0.1.69-2.el8.noarch.rpm | SHA-256: 8b8ec03574375220a7412384bcf85a5481d6693fbdfeb4af00aacea2672e7209 | 
| scap-security-guide-doc-0.1.69-2.el8.noarch.rpm | SHA-256: ecf20addf367ca8c80fccf290dd63138b8bd7ec674c81cf8c93a360a1399b339 | 
Red Hat Enterprise Linux for Power, little endian 8
| SRPM | |
|---|---|
| scap-security-guide-0.1.69-2.el8.src.rpm | SHA-256: c1c544ea16192deb52ebded7ca29d3f4bbfc5a8c3d4145f3c86a278702f3fe90 | 
| ppc64le | |
| scap-security-guide-0.1.69-2.el8.noarch.rpm | SHA-256: 8b8ec03574375220a7412384bcf85a5481d6693fbdfeb4af00aacea2672e7209 | 
| scap-security-guide-doc-0.1.69-2.el8.noarch.rpm | SHA-256: ecf20addf367ca8c80fccf290dd63138b8bd7ec674c81cf8c93a360a1399b339 | 
Red Hat Enterprise Linux for ARM 64 8
| SRPM | |
|---|---|
| scap-security-guide-0.1.69-2.el8.src.rpm | SHA-256: c1c544ea16192deb52ebded7ca29d3f4bbfc5a8c3d4145f3c86a278702f3fe90 | 
| aarch64 | |
| scap-security-guide-0.1.69-2.el8.noarch.rpm | SHA-256: 8b8ec03574375220a7412384bcf85a5481d6693fbdfeb4af00aacea2672e7209 | 
| scap-security-guide-doc-0.1.69-2.el8.noarch.rpm | SHA-256: ecf20addf367ca8c80fccf290dd63138b8bd7ec674c81cf8c93a360a1399b339 | 
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.