UCF STIG Viewer Logo

The system package management tool must cryptographically verify the authenticity of all software packages during installation.


Overview

Finding ID Version Rule ID IA Controls Severity
V-38487 RHEL-06-000015 SV-50288r1_rule Low
Description
Ensuring all packages' cryptographic signatures are valid prior to installation ensures the provenance of the software and protects against malicious tampering.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2014-06-10

Details

Check Text ( None )
None
Fix Text (F-43433r1_fix)
To ensure signature checking is not disabled for any repos, remove any lines from files in "/etc/yum.repos.d" of the form:

gpgcheck=0