Hi Stefan,
Are you sure that you can simply "cat </dev/random >/dev/sdg" on your
GNU/Linux distribution?
This non-root user can already cause the same serious consequences
without gparted (e.g. with a simple cat </dev/random >/dev/sdg).
On my ubuntu 8.04 system, the underlying devices are not open to
unprivileged users, even if the user has access to the file system on
the mounted partition.
For example, the following command output was collected after inserting
my usb stick and having it automatically mounted on /media/USB-512MB:
$ df /media/USB-512MB
Filesystem 1K-blocks Used Available Use% Mounted on
/dev/sde1 496996 118872 378124 24% /media/USB-512MB
$ ls -ld /media/USB-512MB/
drwxr-xr-x 8 gedakc root 4096 1969-12-31 17:00 /media/USB-512MB/
$ ls -ld /dev/sde*
brw-rw---- 1 root disk 8, 64 2010-01-02 16:53 /dev/sde
brw-rw---- 1 root disk 8, 65 2010-01-02 16:53 /dev/sde1
$
As can be seen from the above commands, I can read and write to the file
system mounted at /media/USB-512MB (my userid is gedakc).
However, my userid would not be able to work on the underlying device
(/dev/sde in my case) without privileged access (root is the owner of
the /dev/sde device).
This is one of the main reasons why GParted requires root access to
manipulate partition tables on disk devices.
Regards,
Curtis Gedak
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org