Bug 15560 - Non-Root Users can Run the /usr/sbin/setup
Summary: Non-Root Users can Run the /usr/sbin/setup
Status: CLOSED RAWHIDE
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: setup (Show other bugs)
(Show other bugs)
Version: 6.2
Hardware: i386 Linux
medium
medium
Target Milestone: ---
Assignee: Bill Nottingham
QA Contact:
URL:
Whiteboard:
Keywords:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2000-08-06 13:45 UTC by Brian Z
Modified: 2014-03-17 02:15 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2000-08-06 13:45:05 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

Description Brian Z 2000-08-06 13:45:01 UTC
Non-Root Users can run /usr/sbin/setup.  The program runs normally.  When users try to change things, a whole bunch
of errors fly by and you are displayed with the main menu again.  Maybe we should do a root user check to help
pervent any security exploits in the future?  If nothing else, the normal users have no business being in there
anyway.  Thanks!

Comment 1 Bill Nottingham 2000-08-06 17:12:31 UTC
Since none of the tools are setuid, there's no way this
can be used for a security exploit; the tools will
just fail in various ways.

It's certainly better for it cosmetically to just not
run if not root, though. Fixed in setuptool-1.5-1.


Note You need to log in before you can comment on or make changes to this bug.