blob: 525f8717f089ad51926f0f89e855df0c53d443f2 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
|
Candidate: CVE-2004-0813
References:
MISC:http://lkml.org/lkml/2004/7/30/147
XF:linux-sgio-gain-privileges(17505)
URL:http://xforce.iss.net/xforce/xfdb/17505
Description:
Unknown vulnerability in the SG_IO functionality in ide-cd allows local users
to bypass read-only access and perform unauthorized write and erase
operations.
Notes:
dannf> RedHat is still vulnerable, but there has been recent activity:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133098
dannf> I wonder if one of the patches listed for CVE-2004-1190 fixes this?
horms> I'm pretty sure this is fixed by the series of patches for SG_IO
added upstream in 2.6.8 and the immediately following period.
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=300162
That should clean things up for 2.6.
2.4 doesn't suffer this problem exactly, unless
the permisions of /dev/sg* are botched.
Alan Cox seems to think that is bad, but I'm not so sure.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133098
jmm> Marking 2.4 as N/A, as only local config mistakes would make that
jmm> a problem
Bugs:
upstream: fixed (2.6.10)
linux-2.6: N/A
2.6.8-sarge-security: released (2.6.8-14)
2.4.27-sarge-security: N/A
2.6.18-etch-security: N/A
|