RHEL-06-000011 - System security patches and updates must be installed and up-to-date.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Installing software updates is a fundamental mitigation against the exploitation of publicly-known vulnerabilities.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

If the system is joined to the Red Hat Network, a Red Hat Satellite Server, or a yum server, run the following command to install updates:

# yum update

If the system is not configured to use one of these sources, updates (in the form of RPM packages) can be manually downloaded from the Red Hat Network and installed using 'rpm'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R1_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001233, Rule-ID|SV-217854r505923_rule, STIG-ID|RHEL-06-000011, STIG-Legacy|SV-50281, STIG-Legacy|V-38481, Vuln-ID|V-217854

Plugin: Unix

Control ID: c2589e3978bdb6c7c03a3b7e83586376465fcbb98dff3b9f6463c2f7b151e99c