UCF STIG Viewer Logo

The system package management tool must cryptographically verify the authenticity of all software packages during installation.


Overview

Finding ID Version Rule ID IA Controls Severity
V-219545 OL6-00-000015 SV-219545r793802_rule Low
Description
Ensuring all packages' cryptographic signatures are valid prior to installation ensures the provenance of the software and protects against malicious tampering.
STIG Date
Oracle Linux 6 Security Technical Implementation Guide 2021-12-03

Details

Check Text ( C-21270r358175_chk )
To determine whether "yum" has been configured to disable "gpgcheck" for any repos, inspect all files in "/etc/yum.repos.d" and ensure the following does not appear in any sections:

gpgcheck=0

A value of "0" indicates that "gpgcheck" has been disabled for that repo.
If GPG checking is disabled, this is a finding.

If the "yum" system package management tool is not used to update the system, verify with the SA that installed packages are cryptographically signed.
Fix Text (F-21269r358176_fix)
To ensure signature checking is not disabled for any repos, remove any lines from files in "/etc/yum.repos.d" of the form:

gpgcheck=0