Linux Security
Linux Security
Linux Security

Debian: New util-linux packages fix privilege escalation

Date 28 Sep 2005
Posted By LinuxSecurity Advisories
Updated package.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 823-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
September 29th, 2005          
- --------------------------------------------------------------------------

Package        : util-linux
Vulnerability  : privilege escalation
Problem type   : local
Debian-specific: no
CVE ID         : CAN-2005-2876
Debian Bug     : 328141 329063

David Watson discoverd a bug in mount as provided by util-linux and
other packages such as loop-aes-utils that allows local users to
bypass filesystem access restrictions by re-mounting it read-only.

For the old stable distribution (woody) this problem has been fixed in
version 2.11n-7woody1.

For the stable distribution (sarge) this problem has been fixed in
version 2.12p-4sarge1.

For the unstable distribution (sid) this problem has been fixed in
version 2.12p-8.

We recommend that you upgrade your loop-aes-utils package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:
      Size/MD5 checksum:      641 fce635015061f5d46813f8592a40d4c6
      Size/MD5 checksum:    50075 cf65f5247eb2804b2a50f9194e68cb90
      Size/MD5 checksum:  1442534 8abef2ae7e95177f5253ed4535e074c1

  Architecture independent components:
      Size/MD5 checksum:   650386 a4be44b838e54364ddf1f173221744f5

  Alpha architecture:
      Size/MD5 checksum:    42090 47783226e3c34c116eb07b37d1210d1c
      Size/MD5 checksum:   125614 5ded5ce9534da343bc1f2d1932b1dad2
      Size/MD5 checksum:   389870 25f9bbe360817774d353ff4b0867c1d3

  ARM architecture:
      Size/MD5 checksum:    38952 d27109fd1a530f9645abc7a49782d2a3
      Size/MD5 checksum:    99214 9c97a96648eb0e2de9807ed6ebf28273
      Size/MD5 checksum:   336014 b0a323657cbac6753dbfb2f8702f97e3

  Intel IA-32 architecture:
      Size/MD5 checksum:    39666 6ad1c919266183bc2d9b72900dcacd32
      Size/MD5 checksum:    99486 7c46ddd1c0344fef3b1bdb73b49479d6
      Size/MD5 checksum:   330128 d6e5c87bb8e250d6fb25c42ea4bcabd4

  Intel IA-64 architecture:
      Size/MD5 checksum:    44814 ccd30f34220f611839f6af3804994f35
      Size/MD5 checksum:   141200 2665d0a3d0c4e4c44379cf72f6da820e
      Size/MD5 checksum:   450054 fd182f5abb1f7e5e8e0e7b2c9b7063b8

  HP Precision architecture:
      Size/MD5 checksum:    40848 6ac5aeb7c1f65b14668cf2f25b33dea2
      Size/MD5 checksum:   114886 74597c0f5942039cf0adbc3c6b5fa34d
      Size/MD5 checksum:   367094 4933cae4c4cb1e01ced24d52f3e9b2b0

  Motorola 680x0 architecture:
      Size/MD5 checksum:    39170 62f8cac276d09b134c0a62c42563ab51
      Size/MD5 checksum:    96928 51eb3ba6a32e35ee5e7db83eec7436bf
      Size/MD5 checksum:   203656 937a79d72ea795195c6b761a5aea7bb6

  Big endian MIPS architecture:
      Size/MD5 checksum:    39846 94fa3b3bf56f6d63066603acbbcc3d43
      Size/MD5 checksum:   112544 8493e3d4ee5ac8037a51f30baf2e197b
      Size/MD5 checksum:   348288 d1f62cda038b511e5df00f7850fecd94

  Little endian MIPS architecture:
      Size/MD5 checksum:    39706 508586755e53ed64c3aa32455b0f0b6c
      Size/MD5 checksum:   112684 2e7fd13c29633ce39676f63932b0fc8d
      Size/MD5 checksum:   347824 c6244afdec75eb663065aa13fa7bdeda

  PowerPC architecture:
      Size/MD5 checksum:    39288 96bec0efd657e08892a27c10e2aeb33f
      Size/MD5 checksum:   102562 2a5d7040ab0372bdfbeeacabcd3f6b8b
      Size/MD5 checksum:   339450 0046286fb461e613f10e51f29980abb3

  IBM S/390 architecture:
      Size/MD5 checksum:    40426 b8bbe428e0dcab555753d427112afab6
      Size/MD5 checksum:   106674 62cf3121f0096637cfad9f0b6f42c750
      Size/MD5 checksum:   190018 9130482d45c4d70d75729c75fce92daa

  Sun Sparc architecture:
      Size/MD5 checksum:    46030 8ff343a6e95a5b3f1894b849c328da2e
      Size/MD5 checksum:   113674 744e3c6ebe8ce757f9f8fe6947a9db4a
      Size/MD5 checksum:   273234 bb59545a02d0b7570fb34a4fd12b2c68

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:
      Size/MD5 checksum:      712 9341316ba59e695a6bc89cd9ecda5f65
      Size/MD5 checksum:    73184 777c64bed4a63496ec05456ccf234bcd
      Size/MD5 checksum:  2001658 d47e820f6880c21c8b4c0c7e8a7376cc

  Architecture independent components:
      Size/MD5 checksum:  1078722 5f5e4513c74e6cb5262b4ac976881eb0

  Alpha architecture:
      Size/MD5 checksum:    68950 bb19eb9abe0bc1277e3dd2313b8f4153
      Size/MD5 checksum:   159648 f1636230b6f4523f80edc78aa57ba2aa
      Size/MD5 checksum:   439592 cdaad3d4d275315f03bd304c9d414faf

  AMD64 architecture:
      Size/MD5 checksum:    67222 26b68625dda4c3736124a14543347ebd
      Size/MD5 checksum:   146038 b8f5b355beb87bc3637861fc526c6d85
      Size/MD5 checksum:   400974 361df6632f69bac77bf290f5ab9a0f71

  ARM architecture:
      Size/MD5 checksum:    65290 4efd973f621a30865f70cfcbb70473df
      Size/MD5 checksum:   136262 018f40934ba15fb5e20a0c625f8eb9b9
      Size/MD5 checksum:   386952 cdb739cf88a719d3f74b2519f7ed8abc

  Intel IA-32 architecture:
      Size/MD5 checksum:    65606 8339484e18bf9d4e491c73bc2a9b6a76
      Size/MD5 checksum:   139460 544996c905c84f9cdaef5bc4d0eefb10
      Size/MD5 checksum:   378306 93e989d714a489a8d5ddee64b33c6e90

  Intel IA-64 architecture:
      Size/MD5 checksum:    71536 a088766c3e795b062a612dc6d72a5c70
      Size/MD5 checksum:   173796 5b3790cc40b6e8d1663d6deef0ccab1c
      Size/MD5 checksum:   507240 c5145ec21236d9070a7a6336a980a89e

  HP Precision architecture:
      Size/MD5 checksum:    67900 20a19565eb92558559c0adf23c4c2d0f
      Size/MD5 checksum:   149158 29252ec2808c4d83e2479a33f11ae1a8
      Size/MD5 checksum:   423080 322a7f09ca9f9a237413dc773569c012

  Motorola 680x0 architecture:
      Size/MD5 checksum:    65550 7596fb004730584bffca201e249ab649
      Size/MD5 checksum:   129726 6feecfc0d82581bc412ee9a438e1a29e
      Size/MD5 checksum:   242620 60cccf944698d0a8745374e235289604

  Big endian MIPS architecture:
      Size/MD5 checksum:    71096 027aa05d9700dd5af662b781dcd9775b
      Size/MD5 checksum:   149458 eeaf4aa326ae1b7564b2dda793734068
      Size/MD5 checksum:   453900 69552406024cc032c557c524e783582f

  Little endian MIPS architecture:
      Size/MD5 checksum:    71010 2326040662acc0699d767bae3bebd39f
      Size/MD5 checksum:   150020 1e48ae6712dce580678651ec91663e8b
      Size/MD5 checksum:   453972 e533c8ac5d80dbe2b7c70daf18085af7

  PowerPC architecture:
      Size/MD5 checksum:    65978 05e9556e5750e669bec851420ab8f33f
      Size/MD5 checksum:   147196 41bf9664a9d41b42feb3ecad65d301ed
      Size/MD5 checksum:   406370 1c2d8185c20990c83c17167520a069a5

  IBM S/390 architecture:
      Size/MD5 checksum:    67110 6e0c2effc303c52f8ee6af6c2000d474
      Size/MD5 checksum:   145748 11b35f1e0d8195a764ce017c2b1dc219
      Size/MD5 checksum:   379132 b389239d7f14c30cd020254975ae9b7e

  Sun Sparc architecture:
      Size/MD5 checksum:    65416 57c00592da329cec3c1ebdc1630a671f
      Size/MD5 checksum:   138136 12581a557519b123e3177e37877e2b0f
      Size/MD5 checksum:   274442 5f93b33ea1f6372e244c3c8dcc95a062

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"42","type":"x","order":"1","pct":84,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"4","type":"x","order":"2","pct":8,"resources":[]},{"id":"181","title":"Hardly ever","votes":"4","type":"x","order":"3","pct":8,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.