lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1EfOPp-0007Ru-6f@mercury.mandriva.com>
Date: Thu, 24 Nov 2005 14:14:01 -0700
From: Mandriva Security Team <security@...driva.com>
To: bugtraq@...urityfocus.com
Subject: MDKSA-2005:216 - Updated fuse packages fix vulnerability


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2005:216
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : fuse
 Date    : November 24, 2005
 Affected: 2006.0
 _______________________________________________________________________
 
 Problem Description:
 
 Thomas Beige found that fusermount failed to securely handle special
 characters specified in mount points, which could allow a local
 attacker to corrupt the contents of /etc/mtab by mounting over a
 maliciously-named directory using fusermount.  This could potentially
 allow the attacker to set unauthorized mount options.
 
 This is only possible when fusermount is installed setuid root, which
 is the case in Mandriva Linux.
 
 The updated packages have been patched to address these problems.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3531
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 a3ae4ac8ed8a96214bbe1801722fd68e  2006.0/RPMS/dkms-fuse-2.3.0-2.1.20060mdk.i586.rpm
 7703d6d4e053663bfa3712a6302c07be  2006.0/RPMS/fuse-2.3.0-2.1.20060mdk.i586.rpm
 4daead454fd46fb8ea95953d9a1d3b12  2006.0/RPMS/libfuse2-2.3.0-2.1.20060mdk.i586.rpm
 db457d4c29b4d8d19d34434086e12fc7  2006.0/RPMS/libfuse2-devel-2.3.0-2.1.20060mdk.i586.rpm
 86880673c11a93aa8a9001d79416f962  2006.0/RPMS/libfuse2-static-devel-2.3.0-2.1.20060mdk.i586.rpm
 88ec22000581f550f0f2c11f29e70b0c  2006.0/SRPMS/fuse-2.3.0-2.1.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 c94bfcb85845fd023fd2edfe88af55a4  x86_64/2006.0/RPMS/dkms-fuse-2.3.0-2.1.20060mdk.x86_64.rpm
 bbbfc58364a1ceaeb363428e1cd9423c  x86_64/2006.0/RPMS/fuse-2.3.0-2.1.20060mdk.x86_64.rpm
 5b0cd9cef709bfcf624b35880c5fab46  x86_64/2006.0/RPMS/lib64fuse2-2.3.0-2.1.20060mdk.x86_64.rpm
 80ba54b4cb2467f9d2045114fa859873  x86_64/2006.0/RPMS/lib64fuse2-devel-2.3.0-2.1.20060mdk.x86_64.rpm
 8aa436b1cb28f893fd68ba2fa53ae76e  x86_64/2006.0/RPMS/lib64fuse2-static-devel-2.3.0-2.1.20060mdk.x86_64.rpm
 88ec22000581f550f0f2c11f29e70b0c  x86_64/2006.0/SRPMS/fuse-2.3.0-2.1.20060mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDhgLfmqjQ0CJFipgRAgZMAKCoUKqr+XKmjG91tB9as/8jQjIO5wCg7pCN
k7oCnFekKIWVLBUz0x1ff+Q=
=X3aa
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ