summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2004-0813
blob: 525f8717f089ad51926f0f89e855df0c53d443f2 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Candidate: CVE-2004-0813
References: 
 MISC:http://lkml.org/lkml/2004/7/30/147
 XF:linux-sgio-gain-privileges(17505)
 URL:http://xforce.iss.net/xforce/xfdb/17505
Description: 
 Unknown vulnerability in the SG_IO functionality in ide-cd allows local users
 to bypass read-only access and perform unauthorized write and erase
 operations.
Notes: 
 dannf> RedHat is still vulnerable, but there has been recent activity:
  https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133098
 dannf> I wonder if one of the patches listed for CVE-2004-1190 fixes this?
 horms> I'm pretty sure this is fixed by the series of patches for SG_IO
        added upstream in 2.6.8 and the immediately following period.
	http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=300162
	That should clean things up for 2.6. 
	2.4 doesn't suffer this problem exactly, unless
	the permisions of /dev/sg* are botched.
	Alan Cox seems to think that is bad, but I'm not so sure.
	https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133098
 jmm> Marking 2.4 as N/A, as only local config mistakes would make that
 jmm> a problem
Bugs: 
upstream: fixed (2.6.10)
linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-14)
2.4.27-sarge-security: N/A
2.6.18-etch-security: N/A

© 2014-2024 Faster IT GmbH | imprint | privacy policy