what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Linux Security Advisory 1989-1

Debian Linux Security Advisory 1989-1
Posted Feb 4, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1989-1 - Dan Rosenberg discovered a race condition in FUSE, a Filesystem in USErspace. A local attacker, with access to use FUSE, could unmount arbitrary locations, leading to a denial of service.

tags | advisory, denial of service, arbitrary, local
systems | linux, debian
advisories | CVE-2009-3297
SHA-256 | 600a25e9cf40b3bf3f884de4728b6e3fccf45ba4b8534418fc1639fa74a1d5cd

Debian Linux Security Advisory 1989-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1989-1 security@debian.org
https://www.debian.org/security/ Giuseppe Iuculano
February 02, 2010 https://www.debian.org/security/faq
- ------------------------------------------------------------------------

Packages : fuse
Vulnerability : denial of service
Problem type : local
Debian-specific: no
CVE Id : CVE-2009-3297
Debian Bug : 567633

Dan Rosenberg discovered a race condition in FUSE, a Filesystem in USErspace.
A local attacker, with access to use FUSE, could unmount arbitrary
locations, leading to a denial of service.


For the oldstable distribution (etch), this problem has been fixed in
version 2.5.3-4.4+etch1.

For the stable distribution (lenny), this problem has been fixed in
version 2.7.4-1.1+lenny1.

For the unstable distribution (sid), this problem has been fixed in
version 2.8.1-1.2, and will migrate to the testing distribution (squeeze)
shortly.

We recommend that you upgrade your fuse packages.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian (oldstable)
- ------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

https://security.debian.org/pool/updates/main/f/fuse/fuse_2.5.3-4.4+etch1.dsc
Size/MD5 checksum: 627 5886da280cc253c8ec2c04f5423238ee
https://security.debian.org/pool/updates/main/f/fuse/fuse_2.5.3.orig.tar.gz
Size/MD5 checksum: 409443 9c7e8b6606b9f158ae20b8521ba2867c
https://security.debian.org/pool/updates/main/f/fuse/fuse_2.5.3-4.4+etch1.diff.gz
Size/MD5 checksum: 11785 884b1f0d8646b121d133bb62a42e23c3

alpha architecture (DEC Alpha)

https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_alpha.deb
Size/MD5 checksum: 109494 a46c800a39108d6a148e4db0e1d7d931
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_alpha.deb
Size/MD5 checksum: 54860 4d1acaf1b078a4370c90e47fb4c015e6
https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_alpha.deb
Size/MD5 checksum: 59726 414582a9494fd50bed1bc41fdb17bf29

amd64 architecture (AMD x86_64 (AMD64))

https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_amd64.deb
Size/MD5 checksum: 98016 fcc2e4f1981cc75fbe341be0012490fc
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_amd64.deb
Size/MD5 checksum: 53530 d3857a1f96067112cbe1e7a428178686
https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_amd64.deb
Size/MD5 checksum: 58916 5b992f296e4fba939e27fa6bd961ea6d

arm architecture (ARM)

https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_arm.deb
Size/MD5 checksum: 48512 7be71b3c68391c288d7992f2e135449b
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_arm.deb
Size/MD5 checksum: 93024 5c703f36949e7f156e4b59245c224eff
https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_arm.deb
Size/MD5 checksum: 57820 345ad9a6f3ada4facd993823eded7663

hppa architecture (HP PA RISC)

https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_hppa.deb
Size/MD5 checksum: 56194 6a57e0f225759c4c79e5686378834981
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_hppa.deb
Size/MD5 checksum: 103676 afb7fd5cb28ea33c8b1b37f53349e7e9
https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_hppa.deb
Size/MD5 checksum: 59130 fc3f13580d207f0fe6bf9cfe0034f312

i386 architecture (Intel ia32)

https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_i386.deb
Size/MD5 checksum: 94356 c692a6cb705c58ff1cea736f51bec18c
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_i386.deb
Size/MD5 checksum: 50812 55537e1c0561f86fff06f0a1319098de
https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_i386.deb
Size/MD5 checksum: 58368 cfd1cee4477d2636b8b522a25310c984

ia64 architecture (Intel ia64)

https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_ia64.deb
Size/MD5 checksum: 63764 0c9b12e7c71d48e2bdc9f3de90c4f3c9
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_ia64.deb
Size/MD5 checksum: 115500 8135a9f1b1aead628853749e447784fc
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_ia64.deb
Size/MD5 checksum: 65680 f071d857c64ad4c22aa2266fd1089032

mipsel architecture (MIPS (Little Endian))

https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_mipsel.deb
Size/MD5 checksum: 58768 4162cfc57ba231f3af6d012d590e8375
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_mipsel.deb
Size/MD5 checksum: 103580 095f061de8c350ae2141924b7529ed45
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_mipsel.deb
Size/MD5 checksum: 51218 794ae7a598cdd02a60a410078562aa07

powerpc architecture (PowerPC)

https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_powerpc.deb
Size/MD5 checksum: 58388 4a586a8d11c5bd2c6a8e6e8e0256e703
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_powerpc.deb
Size/MD5 checksum: 98048 d15b93fa2fe7157366dc2eb37f8492a9
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_powerpc.deb
Size/MD5 checksum: 51736 161e6dc0be6a51ab3f3f69be4dc10190

s390 architecture (IBM S/390)

https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_s390.deb
Size/MD5 checksum: 58848 8c62551e8c465e2ef4e87d34f9277852
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_s390.deb
Size/MD5 checksum: 53938 099298f6cc8b72fecb4d69ba742b9611
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_s390.deb
Size/MD5 checksum: 98608 38aab54a2171cec7cf73d5cb9d1d295e

sparc architecture (Sun SPARC/UltraSPARC)

https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_sparc.deb
Size/MD5 checksum: 58206 be267abf6f16d40838c150374ef1fd4f
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_sparc.deb
Size/MD5 checksum: 49212 3300d58324ba45d8e212c0e6b332cc9f
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_sparc.deb
Size/MD5 checksum: 94000 16d5f583748d07192d25ea33fa345c05

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

https://security.debian.org/pool/updates/main/f/fuse/fuse_2.7.4.orig.tar.gz
Size/MD5 checksum: 506658 4879f06570d2225667534c37fea04213
https://security.debian.org/pool/updates/main/f/fuse/fuse_2.7.4-1.1+lenny1.diff.gz
Size/MD5 checksum: 16066 f3a61d6fc003f1a2bf3ea9430f2c9a70
https://security.debian.org/pool/updates/main/f/fuse/fuse_2.7.4-1.1+lenny1.dsc
Size/MD5 checksum: 1171 889cfc800cd72828730f8bcbd9c777d9

alpha architecture (DEC Alpha)

https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_alpha.deb
Size/MD5 checksum: 20556 585cf2070a4ec688247a41646795131e
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_alpha.deb
Size/MD5 checksum: 131872 6955f5703677ceef1b77c75c8b34e629
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_alpha.deb
Size/MD5 checksum: 180872 c23ac8be5311ee40fc3f1890b1a3ffb7

amd64 architecture (AMD x86_64 (AMD64))

https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_amd64.deb
Size/MD5 checksum: 19042 36f5db5328ff4532c28c14bd956fb8c1
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_amd64.deb
Size/MD5 checksum: 129696 0ab699969dfd5437c91af3cafd9a27b2
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_amd64.deb
Size/MD5 checksum: 162514 1d0f908363d1f1d8910b9b029bf1c5df

arm architecture (ARM)

https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_arm.deb
Size/MD5 checksum: 120050 1e1d2c35d13b5b610de23a51d6d6c365
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_arm.deb
Size/MD5 checksum: 153696 46442d428f85f1354b1ae6661e65d561
https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_arm.deb
Size/MD5 checksum: 17432 a9c572365292b5113af0f3a894215ed4

armel architecture (ARM EABI)

https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_armel.deb
Size/MD5 checksum: 17058 33f5fecaf1bac301e0521ec410e8c80e
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_armel.deb
Size/MD5 checksum: 154480 c6e475b074e17c79edf3ff5eb7f9040a
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_armel.deb
Size/MD5 checksum: 121306 eafcfc5360cc53e3981e1dc9b37e4b89

hppa architecture (HP PA RISC)

https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_hppa.deb
Size/MD5 checksum: 19296 e10df02c43836209f2b5f6584356a92c
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_hppa.deb
Size/MD5 checksum: 168740 738e2595ce106f27007e822015d18165
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_hppa.deb
Size/MD5 checksum: 131642 d7b2a7892867d4ec2864f735ab2cf0b2

i386 architecture (Intel ia32)

https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_i386.deb
Size/MD5 checksum: 124622 443691cc6cff7d375d3e58fc6ef7b6d0
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_i386.deb
Size/MD5 checksum: 155244 1d33eb00f1912b128fa225e4032e6272
https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_i386.deb
Size/MD5 checksum: 17894 fc0807ee515177aec7ebf4e90cd28262

ia64 architecture (Intel ia64)

https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_ia64.deb
Size/MD5 checksum: 190582 9abc959eb6696a72b65378cfde3b2d19
https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_ia64.deb
Size/MD5 checksum: 24858 7955ac00698ff5d247020e6f71e0b482
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_ia64.deb
Size/MD5 checksum: 151516 2efac5863ec97b2c378b34ac2fae5c8d

mips architecture (MIPS (Big Endian))

https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_mips.deb
Size/MD5 checksum: 18146 1fc317ba48a3258b059fe881d372690a
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_mips.deb
Size/MD5 checksum: 169262 a23d47c215a0f7af9ece5a36abeb954e
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_mips.deb
Size/MD5 checksum: 124082 a4b3ee554ee279fe3fea8828918d9f21

mipsel architecture (MIPS (Little Endian))

https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_mipsel.deb
Size/MD5 checksum: 168578 9dd6e832747412dbc9cd25f80693c3cb
https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_mipsel.deb
Size/MD5 checksum: 18128 598595bc8251b576c17fcb7e549033be
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_mipsel.deb
Size/MD5 checksum: 123686 f0f2d7dd0022ecb02815054d2599cf7e

powerpc architecture (PowerPC)

https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_powerpc.deb
Size/MD5 checksum: 19598 302d9576bcc31ca2cbd197d4acdc9937
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_powerpc.deb
Size/MD5 checksum: 131390 1edf1966d7d720723e605172c988efc8
https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_powerpc.deb
Size/MD5 checksum: 161734 c4ae4d50ee835cd87e8ffbc2083a6f9f

s390 architecture (IBM S/390)

https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_s390.deb
Size/MD5 checksum: 162644 68e1ef64d38ea794a096f142e6fefb5c
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_s390.deb
Size/MD5 checksum: 131750 c727c3d3652f50e366c6208d05d2087b
https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_s390.deb
Size/MD5 checksum: 18780 75791fd3ebd09343e21baa7664425abd

sparc architecture (Sun SPARC/UltraSPARC)

https://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_sparc.deb
Size/MD5 checksum: 153900 17372c54b216f06f37622154f69477ff
https://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_sparc.deb
Size/MD5 checksum: 120200 45a7e205d213ba40869c74f8d6caf9e7
https://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_sparc.deb
Size/MD5 checksum: 17974 47802bb266babbf313f1d285f6aad652


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb https://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and https://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAktorcQACgkQNxpp46476aq2ygCeOuipMSFahwlsgcr7/KxU17e0
oGUAnRKa5Ucxz8UsCMpb64LjaNKSsgDX
=SXN1
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close