AlmaLinux OS 9 system commands must be owned by root.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-269170 | ALMA-09-010360 | SV-269170r1050052_rule | CCI-001499 | medium |
| Description | ||||
| If AlmaLinux OS 9 allowed any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change management process. This requirement applies to AlmaLinux OS 9 with software libraries that are accessible and configurable, as in the case of interpreted languages. Software libraries also include privileged programs that execute with escalated privileges. | ||||
| STIG | Date | |||
| CloudLinux AlmaLinux OS 9 Security Technical Implementation Guide | 2025-05-22 | |||
Details
Check Text (C-269170r1050052_chk)
Verify the system commands contained in the following directories are owned by "root" with the following command:
$ find -L /bin /sbin /usr/bin /usr/sbin /usr/libexec /usr/local/bin /usr/local/sbin ! -user root -exec ls -l {} \;
If any system commands are found to not be owned by root, this is a finding.
Fix Text (F-73102r1047887_fix)
Configure the system commands to be protected from unauthorized access.
Run the following command, replacing "[FILE]" with any system command file not owned by "root".
$ chown root [FILE]