Debian: New afuse packages fix privilege escalation

    Date16 Jul 2008
    CategoryDebian
    3509
    Posted ByLinuxSecurity Advisories
    Anders Kaseorg discovered that afuse, an automounting file system in user-space, did not properly escape meta characters in paths. This allowed a local attacker with read access to the filesystem to execute commands as the owner of the filesystem.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1611-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                          Thijs Kinkhorst
    July 16, 2008                         http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : afuse
    Vulnerability  : privilege escalation
    Problem type   : local
    Debian-specific: no
    CVE Id(s)      : CVE-2008-2232
    Debian Bug     : 490921
    
    Anders Kaseorg discovered that afuse, an automounting file system
    in user-space, did not properly escape meta characters in paths.
    This allowed a local attacker with read access to the filesystem to
    execute commands as the owner of the filesystem.
    
    For the stable distribution (etch), this problem has been fixed in
    version 0.1.1-1+etch1.
    
    For the unstable distribution (sid), this problem has been fixed in
    version 0.2-3.
    
    We recommend that you upgrade your afuse (0.1.1-1+etch1) package.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/a/afuse/afuse_0.1.1-1+etch1.diff.gz
        Size/MD5 checksum:     3699 645246f8f338b76b6d6785fff9997c5a
      http://security.debian.org/pool/updates/main/a/afuse/afuse_0.1.1-1+etch1.dsc
        Size/MD5 checksum:      657 fe408099626f3bad3bc68d2717df2a9b
      http://security.debian.org/pool/updates/main/a/afuse/afuse_0.1.1.orig.tar.gz
        Size/MD5 checksum:    98171 95cce7d6ed8e984d0ff2d650e6beb167
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/a/afuse/afuse_0.1.1-1+etch1_alpha.deb
        Size/MD5 checksum:    15476 465baebb172ecda5ed1e7bdd174fddac
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/a/afuse/afuse_0.1.1-1+etch1_amd64.deb
        Size/MD5 checksum:    14224 5e5dca72cb191bf0d435f770c62e07f5
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/a/afuse/afuse_0.1.1-1+etch1_arm.deb
        Size/MD5 checksum:    12448 f39bc75bceec2e8979a514bda07164d6
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/a/afuse/afuse_0.1.1-1+etch1_hppa.deb
        Size/MD5 checksum:    14602 603022ee85f781d0c8c155936d432484
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/a/afuse/afuse_0.1.1-1+etch1_i386.deb
        Size/MD5 checksum:    13086 b422ac9cb737dd1fb7827eb6ea222bba
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/a/afuse/afuse_0.1.1-1+etch1_ia64.deb
        Size/MD5 checksum:    17730 9fc41e69a8df1ddee15831b971ededb1
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/a/afuse/afuse_0.1.1-1+etch1_mips.deb
        Size/MD5 checksum:    14232 69ebaa63e04dd9a16ad8ff5a772dc576
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/a/afuse/afuse_0.1.1-1+etch1_mipsel.deb
        Size/MD5 checksum:    14282 9dabd8530851c9588c4927f53cf923d2
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/a/afuse/afuse_0.1.1-1+etch1_powerpc.deb
        Size/MD5 checksum:    13582 c6c86e8600353b4ff4ed66c9608fd7d0
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/a/afuse/afuse_0.1.1-1+etch1_s390.deb
        Size/MD5 checksum:    14154 b36cc8bab5a28d13430a18697bb4b85c
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/a/afuse/afuse_0.1.1-1+etch1_sparc.deb
        Size/MD5 checksum:    12562 ff0fd7531cc011d032f74c78ae17ca0e
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.