[Bug 1288226] Re: buffer overflow with long path names

Launchpad Bug Tracker 1288226 at bugs.launchpad.net
Mon Mar 10 11:49:58 UTC 2014


This bug was fixed in the package udisks - 1.0.4-8ubuntu1.1

---------------
udisks (1.0.4-8ubuntu1.1) saucy-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via long path names
    (LP: #1288226)
    - debian/patches/CVE-2014-0004.patch: limit lengths and properly
      terminate in src/mount-monitor.c.
    - CVE-2014-0004
 -- Marc Deslauriers <marc.deslauriers at ubuntu.com>   Thu, 06 Mar 2014 09:25:27 -0500

** Changed in: udisks (Ubuntu Saucy)
       Status: New => Fix Released

** Changed in: udisks2 (Ubuntu Saucy)
       Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to udisks in Ubuntu.
https://bugs.launchpad.net/bugs/1288226

Title:
  buffer overflow with long path names

Status in “udisks” package in Ubuntu:
  Fix Committed
Status in “udisks2” package in Ubuntu:
  Fix Committed
Status in “udisks” source package in Lucid:
  Won't Fix
Status in “udisks” source package in Precise:
  Fix Released
Status in “udisks” source package in Quantal:
  Fix Released
Status in “udisks2” source package in Quantal:
  Fix Released
Status in “udisks” source package in Saucy:
  Fix Released
Status in “udisks2” source package in Saucy:
  Fix Released
Status in “udisks” source package in Trusty:
  Fix Committed
Status in “udisks2” source package in Trusty:
  Fix Committed

Bug description:
  EMBARGOED until 2014-03-10
  PUBLISHED now: http://lists.freedesktop.org/archives/devkit-devel/2014-March/001568.html

  Florian Weimer of the Red Hat Product Security Team found a flaw in
  the way udisks and udisks2 handled long path names. A malicious, local
  user could use this flaw to create a specially-crafted directory
  structure that could lead to arbitrary code execution with the
  privileges of the udisks daemon (root).

  Huzaifa Sidhpurwala created a proposed patch. I don't like the
  changing from PATH_MAX to 4096, but it looks good otherwise.

  I'll handle the upstream bits, Debian and Ubuntu trusty updates and
  discuss the PATH_MAX issue.

  Upstream fix for udisks 2: http://cgit.freedesktop.org/udisks/commit/?id=244967
  Upstream fix for udisks 1: http://cgit.freedesktop.org/udisks/commit/?h=udisks1&id=ebf61ed8471

  Debian stable updates debdiffs: http://people.debian.org/~mpitt/tmp
  /udisks-CVE-2014-0004/

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/udisks/+bug/1288226/+subscriptions



More information about the foundations-bugs mailing list