Information
When a user or group identifier is removed from the system verify that any data associated with the ID removed is either removed or re-assigned.
Worst case: a previously removed UID/GID is re-instated. Data left behind suddenly is owned and/or accessible to the new ID - gaining unintended access to data left-behind.
Solution
Review the currently mounted local filesystems:
find / \( -fstype jfs -o -fstype jfs2 \) \( -type d -o -type f \) \( -nouser -o -nogroup \) -ls
- Either assign UID/GID:
chown <owner> <file>
chgrp <group> <file>
- or remove the file/directory:
[[ -f <file> ]] && rm -f <file>
[[ -d <file> ]] && rmdir <file>
- Repeat the audit