Vulnerability Discussion
If RHEL 9 allowed any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change management process.
This requirement applies to RHEL 9 with software libraries that are accessible and configurable, as in the case of interpreted languages. Software libraries also include privileged programs that execute with escalated privileges.
Check
Verify the system-wide shared library directories have mode "755" or less permissive with the following command:
$ sudo find -L /lib /lib64 /usr/lib /usr/lib64 -perm /022 -type d -exec ls -l {} \;
If any system-wide shared library file is found to be group-writable or world-writable, this is a finding.
Fix
Configure the system-wide shared library directories (/lib, /lib64, /usr/lib and /usr/lib64) to be protected from unauthorized access.
Run the following command, replacing "[DIRECTORY]" with any library directory with a mode more permissive than 755.
$ sudo chmod 755 [DIRECTORY]