Comment 0 for bug 1288226

Revision history for this message
Martin Pitt (pitti) wrote :

EMBARGOED until 2014-03-10

Florian Weimer of the Red Hat Product Security Team found a flaw in the way udisks and udisks2 handled long path names. A malicious, local user could use this flaw to create a specially-crafted directory structure that could lead to arbitrary code execution with the privileges of the udisks daemon (root).

Huzaifa Sidhpurwala created a proposed patch. I don't like the changing from PATH_MAX to 4096, but it looks good otherwise.

I'll handle the upstream bits, Debian and Ubuntu trusty updates and discuss the PATH_MAX issue.