Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22588 | GEN008800 | SV-26990r2_rule | Low |
Description |
---|
To prevent the installation of software from unauthorized sources, the system package management tool must use cryptographic algorithms to verify the packages are authentic. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2017-01-27 |
Check Text ( None ) |
---|
None |
Fix Text (F-24256r2_fix) |
---|
Edit the YUM configuration containing "gpgcheck=0" and set the value to "1". |