Information
If attackers can gain read access to the /etc/gshadow file, they can easily run a password cracking program against the hashed password to break it. Other security information that is stored in the /etc/gshadow file (such as group administrators) could also be useful to subvert the group.
Solution
Run the following chown to set permissions on /etc/gshadow:
# chown root:root /etc/gshadow
# chmod 000 /etc/gshadow