OL07-00-010020 - The Oracle Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version


Without cryptographic integrity protections, system command and files can be altered by unauthorized users without detection.

Cryptographic mechanisms used for protecting the integrity of information include, for example, signed hash functions using asymmetric cryptography enabling distribution of the public key to verify the hash information while maintaining the confidentiality of the key used to generate the hash.


Run the following command to determine which package owns the file:

# rpm -qf <filename>

The package can be reinstalled from a yum repository using the command:

# sudo yum reinstall <packagename>

Alternatively, the package can be reinstalled from trusted media using the command:

# sudo rpm -Uvh <packagename>

See Also


Item Details

References: CAT|I, CCI|CCI-001749, Rule-ID|SV-221653r853660_rule, STIG-ID|OL07-00-010020, STIG-Legacy|SV-108151, STIG-Legacy|V-99047, Vuln-ID|V-221653

Plugin: Unix

Control ID: da81afd7978fdb2a4d115d5c186412385db9338ac1e1ecd0af30c440e9608e37