udisks2 2.8.0 – Denial of Service (PoC)
The vulnerability can be triggered by using one computer to create a filesystem on a USB key (or other removable media), then editing its filesystem label to include a bunch of %n's, removing and inserting the media into another computer running udisks2 <=2.8.0. This binary runs as root, and if exploited in that capacity could potentially allow full compromise. This will cause a denial of service, crashing udisks2 and not letting it restart (or until /var/lib/udisks2/mounted-fs is removed and the system is restarted). This keeps the system from automounting things like USB drives and CDs. The vulnerability -may- be exploitable beyond a DoS by crafting a format string exploit and putting it in the label of the drive. I tried to exploit it for a couple of days but cannot find a filesystem with a lengthy enough label to be able to fit the exploit and spawn a root shell, as the smallest shellcode I could make was around 50 characters, and the longest filesystem labels I could find are limited to 32 characters.