STIGQter STIGQter: STIG Summary: Oracle Linux 6 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The system package management tool must cryptographically verify the authenticity of all software packages during installation.

DISA Rule

SV-219545r603263_rule

Vulnerability Number

V-219545

Group Title

SRG-OS-000366

Rule Version

OL6-00-000015

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

To ensure signature checking is not disabled for any repos, remove any lines from files in "/etc/yum.repos.d" of the form:

gpgcheck=0

Check Contents

To determine whether "yum" has been configured to disable "gpgcheck" for any repos, inspect all files in "/etc/yum.repos.d" and ensure the following does not appear in any sections:

gpgcheck=0

A value of "0" indicates that "gpgcheck" has been disabled for that repo.
If GPG checking is disabled, this is a finding.

If the "yum" system package management tool is not used to update the system, verify with the SA that installed packages are cryptographically signed.

Vulnerability Number

V-219545

Documentable

False

Rule Version

OL6-00-000015

Severity Override Guidance

To determine whether "yum" has been configured to disable "gpgcheck" for any repos, inspect all files in "/etc/yum.repos.d" and ensure the following does not appear in any sections:

gpgcheck=0

A value of "0" indicates that "gpgcheck" has been disabled for that repo.
If GPG checking is disabled, this is a finding.

If the "yum" system package management tool is not used to update the system, verify with the SA that installed packages are cryptographically signed.

Check Content Reference

M

Target Key

2928

Comments