Linux Security
Linux Security
Linux Security

Debian: New fuse packages fix information disclosure

Date 08 Jul 2005
Posted By Joe Shakespeare
Sven Tantau discovered a security problem in fuse, a filesystem in userspace, that can be exploited by malicious local users to disclose potentially sensitive information.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 744-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
July 8th, 2005                
- --------------------------------------------------------------------------

Package        : fuse
Vulnerability  : programming error
Problem-Type   : local
Debian-specific: no
CVE ID         : CAN-2005-1858
BugTraq ID     : 13857
Debian Bug     : 311634

Sven Tantau discovered a security problem in fuse, a filesystem in
userspace, that can be exploited by malicious, local users to disclose
potentially sensitive information.

The old stable distribution (woody) does not contain the fuse package.

For the stable distribution (sarge) this problem has been fixed in
version 2.2.1-4sarge2.

For the unstable distribution (sid) this problem has been fixed in
version 2.3.0-1.

We recommend that you upgrade your fuse package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      638 67ad2f1822f0f2d1d35d9fe432f43f33
      Size/MD5 checksum:    10632 7ce74449f1b13092ba083361d37bf9da
      Size/MD5 checksum:   355773 250d89b9c7b6ecf531df60c67f75737d

  Architecture independent components:
      Size/MD5 checksum:    80392 61b3019908f4082d5d95272c34012f1e

  Alpha architecture:
      Size/MD5 checksum:    42434 557b634171e2ba302d8991c046e04024
      Size/MD5 checksum:    63044 812a1046936bd2b2d26c3865f2dfdbf7
      Size/MD5 checksum:    34752 d4092db02bc55fa1ac11263ba66ad22d

  ARM architecture:
      Size/MD5 checksum:    39552 83a1291fdb2609775637ff07f60a7b39
      Size/MD5 checksum:    55034 3501e04f7e8bde3f2c0b7ee7664fc98f
      Size/MD5 checksum:    31456 788f7e86c0ef907e7555e48629d80f61

  Intel IA-32 architecture:
      Size/MD5 checksum:    39664 244d168e16596dfc9e0dde78dda3d736
      Size/MD5 checksum:    53146 514f9afb17a9ab8c9afca26a561044c2
      Size/MD5 checksum:    32440 f04cf2781881aa0244a0c66980524c04

  Intel IA-64 architecture:
      Size/MD5 checksum:    44858 75ee6da77c009b2b232cfce3e80e8655
      Size/MD5 checksum:    65144 0e802cae4fa5df2ca85809fee2686f2d
      Size/MD5 checksum:    39486 de96b28421b8ae075f746a8bd16128c9

  HP Precision architecture:
      Size/MD5 checksum:    41318 f12b30e33da42bd5c3eb32a475ddeb27
      Size/MD5 checksum:    58146 caa618bc31fbe6c8b6ccddeb7ae6e511
      Size/MD5 checksum:    35080 fa1252556b7383141e75a058c1407651

  Motorola 680x0 architecture:
      Size/MD5 checksum:    39276 76c2932cfd2626b0b5faf252b328e929
      Size/MD5 checksum:    51548 ad3c2791ee7a7acf062243b15ff08153
      Size/MD5 checksum:    31044 b20db10d38ed9afe98923f4c6c21c52d

  Big endian MIPS architecture:
      Size/MD5 checksum:    41196 9370d9fbece1148d6f4d685cbbb61cad
      Size/MD5 checksum:    58642 3318e281bd916437bd6053a4b0f418d7
      Size/MD5 checksum:    32606 931c3d56b3ca58302132c600e3de96a6

  Little endian MIPS architecture:
      Size/MD5 checksum:    41224 cab1757a0eada5400ed9d25ede79a222
      Size/MD5 checksum:    58670 d419a7e1dcd260ba1ee7ce296ce644fe
      Size/MD5 checksum:    32596 fa4bc95dbab734518d9b91b99c1f7943

  PowerPC architecture:
      Size/MD5 checksum:    40554 1470a88faced8bbc1466b3cea0da3131
      Size/MD5 checksum:    56116 88afed00fea11a4a71845fad6cad7a28
      Size/MD5 checksum:    33270 706daf2762f0badf2a534a6260d15515

  IBM S/390 architecture:
      Size/MD5 checksum:    41052 2d9720667a69b3146f306c5feae242e6
      Size/MD5 checksum:    56570 b56dbfee26df133de0ff58727fa613b3
      Size/MD5 checksum:    34620 d4598efa95c23fd87a8dfd0c65824470

  Sun Sparc architecture:
      Size/MD5 checksum:    39570 56e453198b7ab517ec9aa5c05a493c81
      Size/MD5 checksum:    53348 396dceda115c3ba29d6fd7589769bb82
      Size/MD5 checksum:    31424 5c59be00b12c579440951b8b7f2fc87c

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"50","type":"x","order":"1","pct":80.65,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"7","type":"x","order":"2","pct":11.29,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.06,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.