Red Hat Bugzilla – Bug 1632828
CVE-2018-17336 udisks: Format string vulnerability in udisks_log in udiskslogging.c
Last modified: 2018-10-24 14:02:25 EDT
UDisks 2.8.0 has a format string vulnerability in udisks_log in udiskslogging.c, allowing attackers to obtain sensitive information (stack contents), cause a denial of service (memory corruption), or possibly have unspecified other impact via a malformed filesystem label, as demonstrated by %d or %n substrings. Upstream issue: https://github.com/storaged-project/udisks/issues/578 Upstream patch: https://github.com/pothos/udisks/commit/e369a9b4b08e9373c814c05328b366c938284eb5
Created udisks tracking bugs for this issue: Affects: fedora-all [bug 1632829] Created udisks2 tracking bugs for this issue: Affects: fedora-all [bug 1632830]
For the attack to be successful, an attacker should have physical access to the machine and be able to insert a USB device with a malformed filesystem and wait until udisks2 automount it. This usually happen automatically for a USB device when the user uses a graphical environment (e.g. GNOME). Otherwise, the attack may still be performed if an attacker already has high privileges that allow him to mount devices with udisksctl.
On RHEL the udisks2 packages are compiled with FORTIFY_SOURCE=2, which makes these kind of attacks less dangerous because the classic '%n' is blocked, if the format string is in a writable segment as in this case. This however does not prevent information leaks or crashes.