Check: RHEL-06-000011
Red Hat Enterprise Linux 6 STIG:
RHEL-06-000011
(in versions v2 r2 through v1 r14)
Title
System security patches and updates must be installed and up-to-date. (Cat II impact)
Discussion
Installing software updates is a fundamental mitigation against the exploitation of publicly-known vulnerabilities.
Check Content
If the system is joined to the Red Hat Network, a Red Hat Satellite Server, or a yum server which provides updates, invoking the following command will indicate if updates are available: # yum check-update If the system is not configured to update from one of these sources, run the following command to list when each package was last updated: $ rpm -qa -last Compare this to Red Hat Security Advisories (RHSA) listed at https://access.redhat.com/security/updates/active/ to determine whether the system is missing applicable security and bugfix updates. If updates are not installed, this is a finding.
Fix Text
If the system is joined to the Red Hat Network, a Red Hat Satellite Server, or a yum server, run the following command to install updates: # yum update If the system is not configured to use one of these sources, updates (in the form of RPM packages) can be manually downloaded from the Red Hat Network and installed using "rpm".
Additional Identifiers
Rule ID: SV-217854r603264_rule
Vulnerability ID: V-217854
Group Title: SRG-OS-000191
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001233 |
The organization employs automated mechanisms on an organization-defined frequency to determine the state of information system components with regard to flaw remediation. |
Controls
Number | Title |
---|---|
SI-2 (2) |
Automated Flaw Remediation Status |