Bug 133100 - CAN-2004-0813 SG_IO unsafe user command execution
Summary: CAN-2004-0813 SG_IO unsafe user command execution
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Enterprise Linux 2.1
Classification: Red Hat
Component: kernel
Version: 2.1
Hardware: ia64
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Jason Baron
QA Contact: Brian Brock
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2004-09-21 18:09 UTC by Josh Bressers
Modified: 2013-03-06 05:57 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2004-10-11 09:35:30 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Josh Bressers 2004-09-21 18:09:52 UTC
It is possible that a user with read only access to a device to issue
arbitrary commands (ie 'write' or 'erase firmware').

There is a discussion on the lkml
http://lkml.org/lkml/2004/7/30/147

Comment 1 Mark J. Cox 2004-09-22 08:54:55 UTC
CAN-2004-0813

Comment 2 Mark J. Cox 2004-10-11 09:35:30 UTC
See bug 133098


Note You need to log in before you can comment on or make changes to this bug.