** Description changed: EMBARGOED until 2014-03-10 PUBLISHED now: http://lists.freedesktop.org/archives/devkit-devel/2014-March/001568.html Florian Weimer of the Red Hat Product Security Team found a flaw in the way udisks and udisks2 handled long path names. A malicious, local user could use this flaw to create a specially-crafted directory structure that could lead to arbitrary code execution with the privileges of the udisks daemon (root). Huzaifa Sidhpurwala created a proposed patch. I don't like the changing from PATH_MAX to 4096, but it looks good otherwise. I'll handle the upstream bits, Debian and Ubuntu trusty updates and discuss the PATH_MAX issue. Upstream fix for udisks 2: http://cgit.freedesktop.org/udisks/commit/?id=244967 Upstream fix for udisks 1: http://cgit.freedesktop.org/udisks/commit/?h=udisks1&id=ebf61ed8471 + + Debian stable updates debdiffs: http://people.debian.org/~mpitt/tmp + /udisks-CVE-2014-0004/
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1288226 Title: buffer overflow with long path names To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/udisks/+bug/1288226/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
