Your message dated Mon, 10 Apr 2023 11:33:31 +0200
with message-id <[email protected]>
and subject line Re: udev security update breaks all ext4 removable storage 
handling
has caused the Debian Bug report #1034124,
regarding udev security update breaks all ext4 removable storage handling
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1034124: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034124
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: udisks2

Version: 2.8.1-4+deb10u1

Severity: serious


Hi,


The security team recently released udisks2 2.8.1-4+deb10u1 that forces the mount option 'errors=remount-ro' to be used for all mounting operations on ext4 file systems. However it seems the code was not modified correctly to allow that option to be used.


On a system with a LXDE based desktop environment, hot-plugging an ext4 formatted USB drive, result in the user being presented with an "Mount option `errors=remount-ro' is not allowed" error dialog box, and the mount not occurring.

Same when mounting manually as regular user through udisksctl:

==
max@pibuster:~ $ udisksctl mount -b /dev/sda2
Error mounting /dev/sda2: GDBus.Error:org.freedesktop.UDisks2.Error.OptionNotPermitted: Mount option `errors=remount-ro' is not allowed
==


Looking at debian/patches/mount-ext-readonly-on-errors.patch
It did seem the author of the patch knew options need to be allowed, as he does add "errors=remount-ro" to ext4_allow:

+static const gchar *ext4_allow[] = { "errors=remount-ro", NULL };

However looking at is_mount_option_allowed() in src/udiskslinuxfilesystem.c the allow list handling code only expect a lists of allowed option keys in ext4_allow, not entries in the form key=value...

So that is not going to fly without further changes to is_mount_option_allowed()...



Yours sincerely,

Floris Bos

--- End Message ---
--- Begin Message ---
Control: tags -1 fixed 2.8.1-4+deb10u2

I've uploaded a fixed version to LTS/buster.

-- 
Cheers,
tobi


Format: 1.8
Date: Mon, 10 Apr 2023 08:35:41 +0200
Source: udisks2
Architecture: source
Version: 2.8.1-4+deb10u2
Distribution: buster-security
Urgency: medium
Maintainer: Utopia Maintenance Team 
<[email protected]>
Changed-By: Tobias Frost <[email protected]>
Closes: 1034124
Changes:
 udisks2 (2.8.1-4+deb10u2) buster-security; urgency=medium
 .
   * Non-maintainer upload by the LTS Security Team.
   * Fix regression disallowing specific mount options with value.
     e.g errors=remount-ro. (Closes: #1034124)
Checksums-Sha1:
 4b1f1d6c25c32e9ea8c0384883179c6787faad1e 3463 udisks2_2.8.1-4+deb10u2.dsc
 3352703b4fed7b17ea0ca8ca90b70dc501d6de6e 16968 
udisks2_2.8.1-4+deb10u2.debian.tar.xz
 cbf9c5fa57b5d37aa20638e0ca108e0a7851c2ff 17621 
udisks2_2.8.1-4+deb10u2_amd64.buildinfo
Checksums-Sha256:
 f0957a6d42d0de9548227234af7320e44ada21f1b66837d4e3a461ffc714800a 3463 
udisks2_2.8.1-4+deb10u2.dsc
 73e2c31e29aeae7046448d92e7df45a1e2fcbcbada52c3ce1a895dbb59d44fde 16968 
udisks2_2.8.1-4+deb10u2.debian.tar.xz
 026a8cddb7bd5d8381704c51ff7c24e901b856758c9a24bc8f15bb851b64cd9d 17621 
udisks2_2.8.1-4+deb10u2_amd64.buildinfo
Files:
 115406b20f3c88af7282300de5b57404 3463 admin optional 
udisks2_2.8.1-4+deb10u2.dsc
 25962757ebb5263928ff6229e9468b8f 16968 admin optional 
udisks2_2.8.1-4+deb10u2.debian.tar.xz
 76f303fa42cc6aac6a7ae27dfcb9677c 17621 admin optional 
udisks2_2.8.1-4+deb10u2_amd64.buildinfo

Attachment: signature.asc
Description: PGP signature


--- End Message ---
_______________________________________________
Pkg-utopia-maintainers mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-utopia-maintainers

Reply via email to