Bug 491621
Summary: | ucd-snmp / net-snmp: snmpd runs with privileges of privileged user | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | jsafrane |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520724 | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2009-05-27 13:57:52 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Jan Lieskovsky
2009-03-23 11:48:12 UTC
The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ I don't think this should be tracked as security flaw. snmpd is run as root by default, as root privileges are required to obtain certain information served to SNMP clients by the daemon. This default can be overridden by -u / -g command line arguments, which specify UID / GID under which snmpd should be run. snmpd init script in Red Hat Enterprise Linux 4 and later allows specifying snmpd's command line options in sysconfig file without a need to modify init script itself - /etc/sysconfig/snmpd.options on Red Hat Enterprise Linux 4 and 5, /etc/sysconfig/snmpd on current Fedora versions. |