>From 5ebfec0c617af4a0a440176a7651c01f5ef354a2 Mon Sep 17 00:00:00 2001 From: Shawn Wells <[email protected]> Date: Wed, 23 Jan 2013 20:52:37 -0500 Subject: [PATCH 3/6] [bugfix]set_sysctl_net_ipv6_conf_default_accept_ra didn't have OVAL value passed through
set_sysctl_net_ipv6_conf_default_accept_ra was not passing the sysctl_net_ipv6_conf_default_accept_ra_value variable to the OVAL --- RHEL6/input/system/network/ipv6.xml | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/RHEL6/input/system/network/ipv6.xml b/RHEL6/input/system/network/ipv6.xml index 98387d8..336e619 100644 --- a/RHEL6/input/system/network/ipv6.xml +++ b/RHEL6/input/system/network/ipv6.xml @@ -139,7 +139,7 @@ operator="equals" interactive="0"> An illicit router advertisement message could result in a man-in-the-middle attack. </rationale> <ident cce="27164-3" /> -<oval id="sysctl_net_ipv6_conf_default_accept_ra" /> +<oval id="sysctl_net_ipv6_conf_default_accept_ra" value="sysctl_net_ipv6_conf_default_accept_ra_value" /> <ref nist="CM-7" /> </Rule> -- 1.7.1
_______________________________________________ scap-security-guide mailing list [email protected] https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
