Bug 858573 - rpcbind without -i restricts set/unset to root user on localhost, so pmap_set fails for non-root users unless -i is used
Summary: rpcbind without -i restricts set/unset to root user on localhost, so pmap_set...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: rpcbind
Version: 6.3
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: rc
: ---
Assignee: Steve Dickson
QA Contact: JianHong Yin
URL:
Whiteboard:
Depends On: 731542
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-09-19 07:31 UTC by RHEL Program Management
Modified: 2018-11-29 20:45 UTC (History)
18 users (show)

Fixed In Version: rpcbind-0.2.0-9.el6_3
Doc Type: Bug Fix
Doc Text:
Previously, in the insecure mode, which enables non-root users to set or unset ports, a privileged port was required. As only root users can obtain a privileged port, non-root users could not set or unset ports. To fix this bug, the privileged port has been removed, and thus non-root users are now allowed to set or unset ports on the loopback interface.
Clone Of:
Environment:
Last Closed: 2013-10-23 08:06:14 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 149603 0 None None None 2012-10-30 14:15:15 UTC
Red Hat Product Errata RHBA-2013:1453 0 normal SHIPPED_LIVE rpcbind bug fix 2013-10-23 12:05:52 UTC

Description RHEL Program Management 2012-09-19 07:31:36 UTC
This bug has been copied from bug #731542 and has been proposed
to be backported to 6.3 z-stream (EUS).

Comment 7 errata-xmlrpc 2013-10-23 08:06:14 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2013-1453.html


Note You need to log in before you can comment on or make changes to this bug.