RHEL 9 /etc/group file must have mode 0644 or less permissive to prevent unauthorized access.

STIG ID: RHEL-09-232055  |  SRG: SRG-OS-000480-GPOS-00227 |  Severity: medium |  CCI: CCI-000366 |  Vulnerability Id: V-257891

Vulnerability Discussion

The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is important for system security.

Check

Verify that the "/etc/group" file has mode "0644" or less permissive with the following command:

$ sudo stat -c "%a %n" /etc/group

644 /etc/group

If a value of "0644" or less permissive is not returned, this is a finding.

Fix

Change the mode of the file "/etc/group" to "0644" by running the following command:

$ sudo chmod 0644 /etc/group