Florian Weimer discovered that UDisks incorrectly handled certain long path
names. A local attacker could use this issue to cause udisks to crash,
resulting in a denial of service, or possibly execute arbitrary code.
The default compiler options for affected releases should reduce the
vulnerability to a denial of service.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 13.10 | noarch | udisks2 | < 2.1.0-4ubuntu0.1 | UNKNOWN |
Ubuntu | 13.10 | noarch | gir1.2-udisks-2.0 | < 2.1.0-4ubuntu0.1 | UNKNOWN |
Ubuntu | 13.10 | noarch | libudisks2-0 | < 2.1.0-4ubuntu0.1 | UNKNOWN |
Ubuntu | 13.10 | noarch | libudisks2-dev | < 2.1.0-4ubuntu0.1 | UNKNOWN |
Ubuntu | 13.10 | noarch | udisks | < 1.0.4-8ubuntu1.1 | UNKNOWN |
Ubuntu | 12.10 | noarch | udisks2 | < 2.0.0-1ubuntu1.1 | UNKNOWN |
Ubuntu | 12.10 | noarch | gir1.2-udisks-2.0 | < 2.0.0-1ubuntu1.1 | UNKNOWN |
Ubuntu | 12.10 | noarch | libudisks2-0 | < 2.0.0-1ubuntu1.1 | UNKNOWN |
Ubuntu | 12.10 | noarch | libudisks2-dev | < 2.0.0-1ubuntu1.1 | UNKNOWN |
Ubuntu | 12.10 | noarch | udisks | < 1.0.4-6ubuntu0.1 | UNKNOWN |