Linux Security
    Linux Security
    Linux Security

    Debian: New fuse packages fix information disclosure

    Posted By
    Sven Tantau discovered a security problem in fuse, a filesystem in userspace, that can be exploited by malicious local users to disclose potentially sensitive information.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 744-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    July 8th, 2005                
    - --------------------------------------------------------------------------
    Package        : fuse
    Vulnerability  : programming error
    Problem-Type   : local
    Debian-specific: no
    CVE ID         : CAN-2005-1858
    BugTraq ID     : 13857
    Debian Bug     : 311634
    Sven Tantau discovered a security problem in fuse, a filesystem in
    userspace, that can be exploited by malicious, local users to disclose
    potentially sensitive information.
    The old stable distribution (woody) does not contain the fuse package.
    For the stable distribution (sarge) this problem has been fixed in
    version 2.2.1-4sarge2.
    For the unstable distribution (sid) this problem has been fixed in
    version 2.3.0-1.
    We recommend that you upgrade your fuse package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      638 67ad2f1822f0f2d1d35d9fe432f43f33
          Size/MD5 checksum:    10632 7ce74449f1b13092ba083361d37bf9da
          Size/MD5 checksum:   355773 250d89b9c7b6ecf531df60c67f75737d
      Architecture independent components:
          Size/MD5 checksum:    80392 61b3019908f4082d5d95272c34012f1e
      Alpha architecture:
          Size/MD5 checksum:    42434 557b634171e2ba302d8991c046e04024
          Size/MD5 checksum:    63044 812a1046936bd2b2d26c3865f2dfdbf7
          Size/MD5 checksum:    34752 d4092db02bc55fa1ac11263ba66ad22d
      ARM architecture:
          Size/MD5 checksum:    39552 83a1291fdb2609775637ff07f60a7b39
          Size/MD5 checksum:    55034 3501e04f7e8bde3f2c0b7ee7664fc98f
          Size/MD5 checksum:    31456 788f7e86c0ef907e7555e48629d80f61
      Intel IA-32 architecture:
          Size/MD5 checksum:    39664 244d168e16596dfc9e0dde78dda3d736
          Size/MD5 checksum:    53146 514f9afb17a9ab8c9afca26a561044c2
          Size/MD5 checksum:    32440 f04cf2781881aa0244a0c66980524c04
      Intel IA-64 architecture:
          Size/MD5 checksum:    44858 75ee6da77c009b2b232cfce3e80e8655
          Size/MD5 checksum:    65144 0e802cae4fa5df2ca85809fee2686f2d
          Size/MD5 checksum:    39486 de96b28421b8ae075f746a8bd16128c9
      HP Precision architecture:
          Size/MD5 checksum:    41318 f12b30e33da42bd5c3eb32a475ddeb27
          Size/MD5 checksum:    58146 caa618bc31fbe6c8b6ccddeb7ae6e511
          Size/MD5 checksum:    35080 fa1252556b7383141e75a058c1407651
      Motorola 680x0 architecture:
          Size/MD5 checksum:    39276 76c2932cfd2626b0b5faf252b328e929
          Size/MD5 checksum:    51548 ad3c2791ee7a7acf062243b15ff08153
          Size/MD5 checksum:    31044 b20db10d38ed9afe98923f4c6c21c52d
      Big endian MIPS architecture:
          Size/MD5 checksum:    41196 9370d9fbece1148d6f4d685cbbb61cad
          Size/MD5 checksum:    58642 3318e281bd916437bd6053a4b0f418d7
          Size/MD5 checksum:    32606 931c3d56b3ca58302132c600e3de96a6
      Little endian MIPS architecture:
          Size/MD5 checksum:    41224 cab1757a0eada5400ed9d25ede79a222
          Size/MD5 checksum:    58670 d419a7e1dcd260ba1ee7ce296ce644fe
          Size/MD5 checksum:    32596 fa4bc95dbab734518d9b91b99c1f7943
      PowerPC architecture:
          Size/MD5 checksum:    40554 1470a88faced8bbc1466b3cea0da3131
          Size/MD5 checksum:    56116 88afed00fea11a4a71845fad6cad7a28
          Size/MD5 checksum:    33270 706daf2762f0badf2a534a6260d15515
      IBM S/390 architecture:
          Size/MD5 checksum:    41052 2d9720667a69b3146f306c5feae242e6
          Size/MD5 checksum:    56570 b56dbfee26df133de0ff58727fa613b3
          Size/MD5 checksum:    34620 d4598efa95c23fd87a8dfd0c65824470
      Sun Sparc architecture:
          Size/MD5 checksum:    39570 56e453198b7ab517ec9aa5c05a493c81
          Size/MD5 checksum:    53348 396dceda115c3ba29d6fd7589769bb82
          Size/MD5 checksum:    31424 5c59be00b12c579440951b8b7f2fc87c
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    Which statement best describes how you feel about the recent Linux 5.9 release?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"140","title":"Not a game-changer for me.","votes":"2","type":"x","order":"1","pct":22.22,"resources":[]},{"id":"141","title":"I'm happy with the performance improvements it offers.","votes":"7","type":"x","order":"2","pct":77.78,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.