Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SEGFAULT when evaluating DISA rule #2029

Open
cortesana opened this issue Sep 11, 2023 · 3 comments
Open

SEGFAULT when evaluating DISA rule #2029

cortesana opened this issue Sep 11, 2023 · 3 comments

Comments

@cortesana
Copy link

Description of problem:

A SEGFAULT occurs when scanning a VM using a DISA datastream (Server with GUI).
The SEGFAULT occurred while evaluating the final state of DISA's STIG profile on the SV-230346r877399 rule.

SCAP Security Guide Version:

current upstream master branch as of 2023-09-04

Operating System Version:

RHEL 8

Steps to Reproduce:

  1. Evaluate the state of DISA's STIG profile on a RHEL 8 machine by running:
oscap xccdf eval             --profile '(all)' --report final_disa_stig.html --oval-results             --results-arf disa-xccdf-arf-results.xml /tmp/disa-stig-rhel8-v1r10-xccdf-scap.xml

Actual Results:

Title
	�[1mRHEL 8 must limit the number of concurrent sessions to ten for all accounts and/or account types.�[0;0m
Rule
	xccdf_mil.disa.stig_rule_SV-230346r877399_rule
Ident
	CCI-000054
bash: line 1:  2837 Done                    echo admin123
      2838 Segmentation fault      | sudo -S oscap xccdf eval --profile '(all)' --report final_disa_stig.html --oval-results --results-arf disa-xccdf-arf-results.xml /tmp/disa-stig-rhel8-v1r10-xccdf-scap.xml

Expected Results:

Title
	�[1mRHEL 8 must limit the number of concurrent sessions to ten for all accounts and/or account types.�[0;0m
Rule
	xccdf_mil.disa.stig_rule_SV-230346r877399_rule
Ident
	CCI-000054
Result
	�[32mpass�[0m

Additional Information/Debugging Steps:

This causes an additional failure when the ARF result files to fail to be copied to the host machine.

@Mab879
Copy link
Member

Mab879 commented Dec 13, 2023

I tried to reproduce this a few times and I have been unsuccessful.

@evgenyz
Copy link
Contributor

evgenyz commented Dec 13, 2023

Which versions of CaC and oscap did you use?

@Mab879
Copy link
Member

Mab879 commented Dec 13, 2023

Which versions of CaC and oscap did you use?

The tests I did today was on openscap-1.3.8-1.el8.x86_64.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants