DISA STIGS Viewer

OL 9 system commands must be owned by root.

Overview

Finding ID Version Rule ID IA Controls Severity
V-271774 OL09-00-002505 SV-271774r1092034_rule   Medium
Description
If OL 9 allowed any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change management process. This requirement applies to OL 9 with software libraries that are accessible and configurable, as in the case of interpreted languages. Software libraries also include privileged programs that execute with escalated privileges.
STIG Date
Oracle Linux 9 Security Technical Implementation Guide 2025-05-08

Details

Check Text (C-75824r1092032_chk)
Verify that OL 9 system commands contained in the following directories are owned by "root" with the following command:

$ sudo find -L /bin /sbin /usr/bin /usr/sbin /usr/libexec /usr/local/bin /usr/local/sbin ! -user root -exec ls -l {} \;

If any system commands are found to not be owned by root, this is a finding.
Fix Text (F-75731r1092033_fix)
Configure the system commands to be protected from unauthorized access.

Run the following command, replacing "[FILE]" with any system command file not owned by "root".

$ sudo chown root [FILE]