Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <cce70a42-3e56-42d9-b01e-9c77a63c9917@gmail.com>
Date: Fri, 6 Jun 2025 00:08:16 -0500
From: Jacob Bachmeyer <jcb62281@...il.com>
To: oss-security@...ts.openwall.com, Solar Designer <solar@...nwall.com>,
 Attila Szasz <szasza.contact@...il.com>
Cc: Muhammed Hüsam Alzeyyat <hussamalzeyyat@...il.com>
Subject: Re: Re: Linux kernel: HFS+ filesystem implementation
 issues, exposure in distros

On 6/5/25 21:24, Solar Designer wrote:
> On Tue, Jun 03, 2025 at 12:38:11PM +0200, Attila Szasz wrote:
>> [...]
>> Since then I checked, and 5.4 LTS (any<=5.6) had been vulnerable without
>> the need to ever mount an untrusted/malformed FS just by systematically
>> corrupting a vanilla fs's B-trees with normal operations.

This looks like another (and far more serious) problem.  Mounting a 
crafted malicious image is one thing, but being able to turn an 
already-mounted legitimate filesystem malicious is quite another.

Are those "normal operations" available to unprivileged users?

Could a Web page potentially exploit this by manipulating the browser's 
disk cache or other storage mechanisms?  (Hopefully not, but that would 
make this remotely exploitable on what is (I hope) an extremely rare 
configuration.)

Do I correctly read "(any<=5.6)" as indicating that the filesystem 
corruption bug has been fixed for a long time now?


-- Jacob

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.