On 12/3/12 7:04 PM, Shawn Wells wrote:

0001-DISA-FSO-requested-updates-to-RHEL6-input-system-sof.patch


 From 11f3bb586976ce7ca53414f507b818c2080be42f Mon Sep 17 00:00:00 2001
From: Shawn Wells<[email protected]>
Date: Mon, 3 Dec 2012 19:04:03 -0500
Subject: [PATCH] DISA FSO requested updates to 
RHEL6/input/system/software/integrity.xml
  DISA FSO requested updates to RHEL6/input/system/software/integrity.xml
  https://fedorahosted.org/scap-security-guide/ticket/162  --> closed

---
  RHEL6/input/system/software/integrity.xml |    8 ++++----
  1 files changed, 4 insertions(+), 4 deletions(-)

diff --git a/RHEL6/input/system/software/integrity.xml 
b/RHEL6/input/system/software/integrity.xml
index 14730e2..54c106c 100644
--- a/RHEL6/input/system/software/integrity.xml
+++ b/RHEL6/input/system/software/integrity.xml
@@ -146,12 +146,12 @@ See the man page for <tt>rpm</tt> to see a complete 
explanation of each column.
  <description>The RPM package management system can check file access
  permissions of installed software packages, including many that are
  important to system security. The following command will list which
-files on the system have permissions that are different from what
+files on the system have permissions different from what
  is expected by the RPM database:
  <pre># rpm -Va | grep '^.M'</pre>
  </description>
  <ocil clause="there is output">
-The following command will list which files on the system have permissions 
that are different from what
+The following command will list which files on the system have permissions 
different from what
  is expected by the RPM database:
  <pre># rpm -Va | grep '^.M'</pre>
  </ocil>
@@ -220,7 +220,7 @@ to fulfill this role.
  </description>
  <ocil clause="no host-based intrusion detection tools are installed">
  Inspect the system to determine if intrusion detection software has been 
installed.
-Verify that the intrusion detection software is active.
+Verify the intrusion detection software is active.
  <!-- add instructions for HBSS?  the text in the RHEL 5 STIG is wrong as usual 
-->
  </ocil>
  <rationale>
@@ -256,7 +256,7 @@ Inspect the system for a cron job or system service which 
executes
  a virus scanning tool regularly.
  <br/>
  <!-- this should be handled as DoD-specific text in a future revision -->
-To verify that the McAfee command line scan tool (uvscan) is scheduled for
+To verify the McAfee command line scan tool (uvscan) is scheduled for
  regular execution, run the following command to check for a cron job:
  <pre># grep uvscan/etc/cron* /var/spool/cron/*</pre>
  This will reveal if and when the uvscan program will be run.
-- 1.7.1

Ack & pushed

--
Shawn Wells
Technical Director,
U.S. Intelligence Programs
(e) [email protected]
(c) 443.534.0130

_______________________________________________
scap-security-guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide

Reply via email to