Bug 15560 - Non-Root Users can Run the /usr/sbin/setup
Non-Root Users can Run the /usr/sbin/setup
Status: CLOSED RAWHIDE
Product: Red Hat Linux
Classification: Retired
Component: setup (Show other bugs)
6.2
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Bill Nottingham
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2000-08-06 09:45 EDT by Brian Z
Modified: 2014-03-16 22:15 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2000-08-06 09:45:05 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Brian Z 2000-08-06 09:45:01 EDT
Non-Root Users can run /usr/sbin/setup.  The program runs normally.  When users try to change things, a whole bunch
of errors fly by and you are displayed with the main menu again.  Maybe we should do a root user check to help
pervent any security exploits in the future?  If nothing else, the normal users have no business being in there
anyway.  Thanks!
Comment 1 Bill Nottingham 2000-08-06 13:12:31 EDT
Since none of the tools are setuid, there's no way this
can be used for a security exploit; the tools will
just fail in various ways.

It's certainly better for it cosmetically to just not
run if not root, though. Fixed in setuptool-1.5-1.

Note You need to log in before you can comment on or make changes to this bug.