![]() |
|
Message-ID: <cce70a42-3e56-42d9-b01e-9c77a63c9917@gmail.com> Date: Fri, 6 Jun 2025 00:08:16 -0500 From: Jacob Bachmeyer <jcb62281@...il.com> To: oss-security@...ts.openwall.com, Solar Designer <solar@...nwall.com>, Attila Szasz <szasza.contact@...il.com> Cc: Muhammed Hüsam Alzeyyat <hussamalzeyyat@...il.com> Subject: Re: Re: Linux kernel: HFS+ filesystem implementation issues, exposure in distros On 6/5/25 21:24, Solar Designer wrote: > On Tue, Jun 03, 2025 at 12:38:11PM +0200, Attila Szasz wrote: >> [...] >> Since then I checked, and 5.4 LTS (any<=5.6) had been vulnerable without >> the need to ever mount an untrusted/malformed FS just by systematically >> corrupting a vanilla fs's B-trees with normal operations. This looks like another (and far more serious) problem. Mounting a crafted malicious image is one thing, but being able to turn an already-mounted legitimate filesystem malicious is quite another. Are those "normal operations" available to unprivileged users? Could a Web page potentially exploit this by manipulating the browser's disk cache or other storage mechanisms? (Hopefully not, but that would make this remotely exploitable on what is (I hope) an extremely rare configuration.) Do I correctly read "(any<=5.6)" as indicating that the filesystem corruption bug has been fixed for a long time now? -- Jacob
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.