Login
Newsletter
Werbung

Sicherheit: Überschreiben von mtab in fuse
Aktuelle Meldungen Distributionen
Name: Überschreiben von mtab in fuse
ID: DTSA-27-1
Distribution: Debian Testing
Plattformen: Debian testing
Datum: Di, 24. Januar 2006, 11:03
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3531
Applikationen: Filesystem in Userspace

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Testing Security Advisory DTSA-27-1 Janurary 20th, 2006
secure-testing-team@lists.alioth.debian.org Neil McGovern
http://secure-testing-master.debian.net/
- --------------------------------------------------------------------------

Package : fuse
Vulnerability : potential data corruption when installed seduid root
Problem-Scope : local
Debian-specific: No
CVE ID : CVE-2005-3531

Thomas Biege discovered that fusermount in FUSE before 2.4.1, if installed
setuid root, allows local users to corrupt /etc/mtab and possibly modify mount
options by performing a mount over a directory whose name contains certain
special characters

Successful exploitation could result in a denial of service if mount options
become unusable. An attacker can also exploit this issue to add arbitrary mount
points that could grant the attacker read and possibly write access to
otherwise restricted or privileged mount points. Other attacks are also
possible.

For the testing distribution (etch) this is fixed in version
2.3.0-4.2etch1

For the unstable distribution (sid) this is fixed in version
2.4.1-0.1

This upgrade is recommended if you use fuse.

The Debian testing security team does not track security issues for the
stable (sarge) and oldstable (woody) distributions. If stable is vulnerable,
the Debian security team will make an announcement once a fix is ready.

Upgrade Instructions
- --------------------

To use the Debian testing security archive, add the following lines to
your /etc/apt/sources.list:

deb http://secure-testing.debian.net/debian-secure-testingetch/security-updates main contrib non-free
deb-src http://secure-testing.debian.net/debian-secure-testingetch/security-updates main contrib non-free

Run the following command as root to make apt trust this repository:

wget http://secure-testing-master.debian.net/ziyi-2005-7.asc-O - | sudo apt-key add -

To install the update, run this command as root:

apt-get update && apt-get upgrade

For further information about the Debian testing security team, please refer
to http://secure-testing-master.debian.net/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFD1fnj97LBwbNFvdMRAt/JAJwMpLostkUFbT09bWd/Bgq6AxbIQgCfcg2d
C7lHCQG6W++YJt43fER58ME=
=YxmJ
-----END PGP SIGNATURE-----

_______________________________________________
secure-testing-announce mailing list
secure-testing-announce@lists.alioth.debian.org
http://lists.alioth.debian.org/mailman/listinfo/secure-testing-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung