Bug 15560 - Non-Root Users can Run the /usr/sbin/setup
Summary: Non-Root Users can Run the /usr/sbin/setup
Status: CLOSED RAWHIDE
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: setup
Version: 6.2
Hardware: i386
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Bill Nottingham
QA Contact:
URL:
Whiteboard:
Keywords:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2000-08-06 13:45 UTC by Brian Z
Modified: 2014-03-17 02:15 UTC (History)
1 user (show)

(edit)
Clone Of:
(edit)
Last Closed: 2000-08-06 13:45:05 UTC


Attachments (Terms of Use)

Description Brian Z 2000-08-06 13:45:01 UTC
Non-Root Users can run /usr/sbin/setup.  The program runs normally.  When users try to change things, a whole bunch
of errors fly by and you are displayed with the main menu again.  Maybe we should do a root user check to help
pervent any security exploits in the future?  If nothing else, the normal users have no business being in there
anyway.  Thanks!

Comment 1 Bill Nottingham 2000-08-06 17:12:31 UTC
Since none of the tools are setuid, there's no way this
can be used for a security exploit; the tools will
just fail in various ways.

It's certainly better for it cosmetically to just not
run if not root, though. Fixed in setuptool-1.5-1.


Note You need to log in before you can comment on or make changes to this bug.