Information
When a user or group identifier is removed from the system verify that any data associated with the ID removed is either removed or re-assigned.
Worst case: a previously removed UID/GID is re-instated. Data left behind suddenly is owned and/or accessible to the new ID - gaining unintended access to data left-behind.
Solution
Review the currently mounted
local
filesystems:
find / ( -fstype jfs -o -fstype jfs2 ) ( -type d -o -type f ) ( -nouser -o -nogroup ) -ls
- Either assign UID/GID:
chown <owner> <file>
chgrp <group> <file>
- or remove the file/directory:
[[ -f <file> ]] && rm -f <file>
[[ -d <file> ]] && rmdir <file>
- Repeat the audit