exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-047

Mandriva Linux Security Advisory 2010-047
Posted Feb 24, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-047 - A race condition has been found in fuse that could escalate privileges for local users and lead to a DoS (Denial of Service). The updated packages have been patched to correct this issue.

tags | advisory, denial of service, local
systems | linux, mandriva
advisories | CVE-2009-3297
SHA-256 | 5496a7be3557bf95039baacc383fe0397de4ec0b2e027ce7564be91becfda6f2

Mandriva Linux Security Advisory 2010-047

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:047
https://www.mandriva.com/security/
_______________________________________________________________________

Package : fuse
Date : February 23, 2010
Affected: 2009.0, 2009.1, 2010.0, Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A race condition has been found in fuse that could escalate privileges
for local users and lead to a DoS (Denial of Service) (CVE-2009-3297).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3297
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2009.0:
6e4b0216387f878e7882e278cd03890c 2009.0/i586/fuse-2.7.4-4.2mdv2009.0.i586.rpm
59bb29913fd9d910cbfeb017b1bb2c03 2009.0/i586/libfuse2-2.7.4-4.2mdv2009.0.i586.rpm
784fa0b3b0d468597e806ea8cc9b8893 2009.0/i586/libfuse-devel-2.7.4-4.2mdv2009.0.i586.rpm
7ac767c17c3d32d88b90d3cc8c5dd965 2009.0/i586/libfuse-static-devel-2.7.4-4.2mdv2009.0.i586.rpm
3a04451a95b68ef179a4a7b7ac5dc5da 2009.0/SRPMS/fuse-2.7.4-4.2mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
e7fe5f85a0cee3c524b4210ccd09a25e 2009.0/x86_64/fuse-2.7.4-4.2mdv2009.0.x86_64.rpm
c719de4ef8110f79c1989bc1d81c81ba 2009.0/x86_64/lib64fuse2-2.7.4-4.2mdv2009.0.x86_64.rpm
ad13b13095ace9186846d61262d122be 2009.0/x86_64/lib64fuse-devel-2.7.4-4.2mdv2009.0.x86_64.rpm
aa54f027800ad43dc5f894bb0021ed26 2009.0/x86_64/lib64fuse-static-devel-2.7.4-4.2mdv2009.0.x86_64.rpm
3a04451a95b68ef179a4a7b7ac5dc5da 2009.0/SRPMS/fuse-2.7.4-4.2mdv2009.0.src.rpm

Mandriva Linux 2009.1:
b865d4831a749539ab713269999ea9dd 2009.1/i586/fuse-2.7.4-4.3mdv2009.1.i586.rpm
43d1da9a224b987f57dbf990987f6dff 2009.1/i586/libfuse2-2.7.4-4.3mdv2009.1.i586.rpm
9f9d3372f4fe934633be1305d148dd3c 2009.1/i586/libfuse-devel-2.7.4-4.3mdv2009.1.i586.rpm
3147c5422671a21d1b3afe2a97f9aea0 2009.1/i586/libfuse-static-devel-2.7.4-4.3mdv2009.1.i586.rpm
cae86f69b7edd72b2d7c8fc2ae9d463a 2009.1/SRPMS/fuse-2.7.4-4.3mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
34b4f022dbdb82956c266a36c62605e1 2009.1/x86_64/fuse-2.7.4-4.3mdv2009.1.x86_64.rpm
98d5ef1beea66491eb6e2ff38ee8de28 2009.1/x86_64/lib64fuse2-2.7.4-4.3mdv2009.1.x86_64.rpm
808d4f144f9971d54221cc38b3127234 2009.1/x86_64/lib64fuse-devel-2.7.4-4.3mdv2009.1.x86_64.rpm
7980cdd9b7b0e479dca87819ceeb3797 2009.1/x86_64/lib64fuse-static-devel-2.7.4-4.3mdv2009.1.x86_64.rpm
cae86f69b7edd72b2d7c8fc2ae9d463a 2009.1/SRPMS/fuse-2.7.4-4.3mdv2009.1.src.rpm

Mandriva Linux 2010.0:
ea51af10791d0f53468b14f541ab786d 2010.0/i586/fuse-2.8.1-1.2mdv2010.0.i586.rpm
0575ffae01daec2f8516a8a3b536fb8a 2010.0/i586/libfuse2-2.8.1-1.2mdv2010.0.i586.rpm
189b1128bcff2aa241f6a7bd7f2d3683 2010.0/i586/libfuse-devel-2.8.1-1.2mdv2010.0.i586.rpm
4dd995ea6e99cd21381fb520560449b3 2010.0/i586/libfuse-static-devel-2.8.1-1.2mdv2010.0.i586.rpm
82a9317aa1125a743a2b989b67f61c6e 2010.0/SRPMS/fuse-2.8.1-1.2mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
00210e1e89a6411edef60aceb29838d7 2010.0/x86_64/fuse-2.8.1-1.2mdv2010.0.x86_64.rpm
0fc3eeb2097487c04cdbbf2c9f713254 2010.0/x86_64/lib64fuse2-2.8.1-1.2mdv2010.0.x86_64.rpm
805eb90afc26a9003cf11a647b6258dc 2010.0/x86_64/lib64fuse-devel-2.8.1-1.2mdv2010.0.x86_64.rpm
bb3f0d6ca00229d049e27070e0b71dff 2010.0/x86_64/lib64fuse-static-devel-2.8.1-1.2mdv2010.0.x86_64.rpm
82a9317aa1125a743a2b989b67f61c6e 2010.0/SRPMS/fuse-2.8.1-1.2mdv2010.0.src.rpm

Mandriva Enterprise Server 5:
33cba1aee40a6ee2fcb299017a5e4cd6 mes5/i586/fuse-2.7.4-4.2mdvmes5.i586.rpm
b3adc8def8f3112c04b6e336fb756bab mes5/i586/libfuse2-2.7.4-4.2mdvmes5.i586.rpm
345e33a088199f6d9757ef611a14b235 mes5/i586/libfuse-devel-2.7.4-4.2mdvmes5.i586.rpm
600dd4a0e2c96aaa1fbdb5b44a983e37 mes5/i586/libfuse-static-devel-2.7.4-4.2mdvmes5.i586.rpm
6aba862e96f6de56e772a023a294e06b mes5/SRPMS/fuse-2.7.4-4.2mdvmes5.src.rpm

Mandriva Enterprise Server 5/X86_64:
924223171a979a33144e327daf62e326 mes5/x86_64/fuse-2.7.4-4.2mdvmes5.x86_64.rpm
f9d7bb274830165786dec958b553f268 mes5/x86_64/lib64fuse2-2.7.4-4.2mdvmes5.x86_64.rpm
c0dfce9673397c7338f6711afe715d4a mes5/x86_64/lib64fuse-devel-2.7.4-4.2mdvmes5.x86_64.rpm
6d5dffdb26b2e40e6e7fb82ce21aa379 mes5/x86_64/lib64fuse-static-devel-2.7.4-4.2mdvmes5.x86_64.rpm
6aba862e96f6de56e772a023a294e06b mes5/SRPMS/fuse-2.7.4-4.2mdvmes5.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

https://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLhAvfmqjQ0CJFipgRAg7NAKCE01fbXzAYHt7cMkGqCd8+O8m8lQCg00m2
lTEF6qVsvGomGAQpO3ZeCP4=
=uks9
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close