This is public now. I removed the attached patches; they were valid, but
had a wrong attribution (the original patch was from David Zeuthen). I
put links to the official upstream patches into the description.

** Description changed:

  EMBARGOED until 2014-03-10
+ PUBLISHED now: 
http://lists.freedesktop.org/archives/devkit-devel/2014-March/001568.html
  
  Florian Weimer of the Red Hat Product Security Team found a flaw in the
  way udisks and udisks2 handled long path names. A malicious, local user
  could use this flaw to create a specially-crafted directory structure
  that could lead to arbitrary code execution with the privileges of the
  udisks daemon (root).
  
  Huzaifa Sidhpurwala created a proposed patch. I don't like the changing
  from PATH_MAX to 4096, but it looks good otherwise.
  
  I'll handle the upstream bits, Debian and Ubuntu trusty updates and
  discuss the PATH_MAX issue.
+ 
+ Upstream fix for udisks 2: 
http://cgit.freedesktop.org/udisks/commit/?id=244967
+ Upstream fix for udisks 1: 
http://cgit.freedesktop.org/udisks/commit/?h=udisks1&id=ebf61ed8471

** Patch removed: "improved udisks2 patch"
   
https://bugs.launchpad.net/ubuntu/+source/udisks/+bug/1288226/+attachment/4008467/+files/udisks2.patch

** Patch removed: "fixed backported patch for udisks 1"
   
https://bugs.launchpad.net/ubuntu/+source/udisks/+bug/1288226/+attachment/4008468/+files/udisks1.patch

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to udisks2 in Ubuntu.
https://bugs.launchpad.net/bugs/1288226

Title:
  buffer overflow with long path names

Status in “udisks” package in Ubuntu:
  In Progress
Status in “udisks2” package in Ubuntu:
  In Progress
Status in “udisks” source package in Lucid:
  Won't Fix
Status in “udisks” source package in Precise:
  New
Status in “udisks” source package in Quantal:
  New
Status in “udisks2” source package in Quantal:
  New
Status in “udisks” source package in Saucy:
  New
Status in “udisks2” source package in Saucy:
  New
Status in “udisks” source package in Trusty:
  In Progress
Status in “udisks2” source package in Trusty:
  In Progress

Bug description:
  EMBARGOED until 2014-03-10
  PUBLISHED now: 
http://lists.freedesktop.org/archives/devkit-devel/2014-March/001568.html

  Florian Weimer of the Red Hat Product Security Team found a flaw in
  the way udisks and udisks2 handled long path names. A malicious, local
  user could use this flaw to create a specially-crafted directory
  structure that could lead to arbitrary code execution with the
  privileges of the udisks daemon (root).

  Huzaifa Sidhpurwala created a proposed patch. I don't like the
  changing from PATH_MAX to 4096, but it looks good otherwise.

  I'll handle the upstream bits, Debian and Ubuntu trusty updates and
  discuss the PATH_MAX issue.

  Upstream fix for udisks 2: 
http://cgit.freedesktop.org/udisks/commit/?id=244967
  Upstream fix for udisks 1: 
http://cgit.freedesktop.org/udisks/commit/?h=udisks1&id=ebf61ed8471

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/udisks/+bug/1288226/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to