Hi Stefan,

Are you sure that you can simply "cat </dev/random >/dev/sdg" on your GNU/Linux distribution?

This non-root user can already cause the same serious consequences
without gparted (e.g. with a simple cat </dev/random >/dev/sdg).


On my ubuntu 8.04 system, the underlying devices are not open to unprivileged users, even if the user has access to the file system on the mounted partition.

For example, the following command output was collected after inserting my usb stick and having it automatically mounted on /media/USB-512MB:

$ df /media/USB-512MB
Filesystem           1K-blocks      Used Available Use% Mounted on
/dev/sde1               496996    118872    378124  24% /media/USB-512MB
$ ls -ld /media/USB-512MB/
drwxr-xr-x 8 gedakc root 4096 1969-12-31 17:00 /media/USB-512MB/
$ ls -ld /dev/sde*
brw-rw---- 1 root disk 8, 64 2010-01-02 16:53 /dev/sde
brw-rw---- 1 root disk 8, 65 2010-01-02 16:53 /dev/sde1
$

As can be seen from the above commands, I can read and write to the file system mounted at /media/USB-512MB (my userid is gedakc).

However, my userid would not be able to work on the underlying device (/dev/sde in my case) without privileged access (root is the owner of the /dev/sde device).

This is one of the main reasons why GParted requires root access to manipulate partition tables on disk devices.

Regards,
Curtis Gedak




--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to