>From 5ebfec0c617af4a0a440176a7651c01f5ef354a2 Mon Sep 17 00:00:00 2001
From: Shawn Wells <[email protected]>
Date: Wed, 23 Jan 2013 20:52:37 -0500
Subject: [PATCH 3/6] [bugfix]set_sysctl_net_ipv6_conf_default_accept_ra didn't 
have OVAL value passed through

set_sysctl_net_ipv6_conf_default_accept_ra was not passing the
sysctl_net_ipv6_conf_default_accept_ra_value variable to the OVAL
---
 RHEL6/input/system/network/ipv6.xml |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)

diff --git a/RHEL6/input/system/network/ipv6.xml 
b/RHEL6/input/system/network/ipv6.xml
index 98387d8..336e619 100644
--- a/RHEL6/input/system/network/ipv6.xml
+++ b/RHEL6/input/system/network/ipv6.xml
@@ -139,7 +139,7 @@ operator="equals" interactive="0">
 An illicit router advertisement message could result in a man-in-the-middle 
attack.
 </rationale>
 <ident cce="27164-3" />
-<oval id="sysctl_net_ipv6_conf_default_accept_ra" />
+<oval id="sysctl_net_ipv6_conf_default_accept_ra" 
value="sysctl_net_ipv6_conf_default_accept_ra_value" />
 <ref nist="CM-7" />
 </Rule>
 
-- 
1.7.1

_______________________________________________
scap-security-guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide

Reply via email to