Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-783 | GEN000120 | SV-63099r1_rule | Medium |
Description |
---|
Timely patching is critical for maintaining the operational availability, confidentiality, and integrity of information technology (IT) systems. However, failure to keep operating system and application software patched is a common mistake made by IT professionals. New patches are released daily, and it is often difficult for even experienced system administrators to keep abreast of all the new patches. When new weaknesses in an operating system exist, patches are usually made available by the vendor to resolve the problems. If the most recent security patches and updates are not installed, unauthorized users may take advantage of weaknesses present in the unpatched software. The lack of prompt attention to patching could result in a system compromise. |
STIG | Date |
---|---|
Oracle Linux 5 Security Technical Implementation Guide | 2018-10-03 |
Check Text ( C-51851r1_chk ) |
---|
Obtain the list of available package security updates from the operating system vendor. Check the available package security updates have been installed on the system. Use the "rpm" command to list the packages installed on the system. Example: # rpm -qa -last If updated packages are available and applicable to the system and have not been installed, this is a finding. For more information, see: (1) http://linux.oracle.com/errata/ and (2) http://linux.oracle.com/cve/. |
Fix Text (F-53683r1_fix) |
---|
Install the patches or updated packages available from the vendor. |