---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: Debian update for fuse SECUNIA ADVISORY ID: SA38437 VERIFY ADVISORY: http://secunia.com/advisories/38437/ DESCRIPTION: Debian has issued an update for fuse. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service). For more information: SA38261 SOLUTION: Apply updated packages. -- Debian GNU/Linux 4.0 alias etch -- Source archives: http://security.debian.org/pool/updates/main/f/fuse/fuse_2.5.3-4.4+etch1.dsc Size/MD5 checksum: 627 5886da280cc253c8ec2c04f5423238ee http://security.debian.org/pool/updates/main/f/fuse/fuse_2.5.3.orig.tar.gz Size/MD5 checksum: 409443 9c7e8b6606b9f158ae20b8521ba2867c http://security.debian.org/pool/updates/main/f/fuse/fuse_2.5.3-4.4+etch1.diff.gz Size/MD5 checksum: 11785 884b1f0d8646b121d133bb62a42e23c3 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_alpha.deb Size/MD5 checksum: 109494 a46c800a39108d6a148e4db0e1d7d931 http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_alpha.deb Size/MD5 checksum: 54860 4d1acaf1b078a4370c90e47fb4c015e6 http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_alpha.deb Size/MD5 checksum: 59726 414582a9494fd50bed1bc41fdb17bf29 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_amd64.deb Size/MD5 checksum: 98016 fcc2e4f1981cc75fbe341be0012490fc http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_amd64.deb Size/MD5 checksum: 53530 d3857a1f96067112cbe1e7a428178686 http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_amd64.deb Size/MD5 checksum: 58916 5b992f296e4fba939e27fa6bd961ea6d arm architecture (ARM) http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_arm.deb Size/MD5 checksum: 48512 7be71b3c68391c288d7992f2e135449b http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_arm.deb Size/MD5 checksum: 93024 5c703f36949e7f156e4b59245c224eff http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_arm.deb Size/MD5 checksum: 57820 345ad9a6f3ada4facd993823eded7663 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_hppa.deb Size/MD5 checksum: 56194 6a57e0f225759c4c79e5686378834981 http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_hppa.deb Size/MD5 checksum: 103676 afb7fd5cb28ea33c8b1b37f53349e7e9 http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_hppa.deb Size/MD5 checksum: 59130 fc3f13580d207f0fe6bf9cfe0034f312 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_i386.deb Size/MD5 checksum: 94356 c692a6cb705c58ff1cea736f51bec18c http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_i386.deb Size/MD5 checksum: 50812 55537e1c0561f86fff06f0a1319098de http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_i386.deb Size/MD5 checksum: 58368 cfd1cee4477d2636b8b522a25310c984 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_ia64.deb Size/MD5 checksum: 63764 0c9b12e7c71d48e2bdc9f3de90c4f3c9 http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_ia64.deb Size/MD5 checksum: 115500 8135a9f1b1aead628853749e447784fc http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_ia64.deb Size/MD5 checksum: 65680 f071d857c64ad4c22aa2266fd1089032 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_mipsel.deb Size/MD5 checksum: 58768 4162cfc57ba231f3af6d012d590e8375 http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_mipsel.deb Size/MD5 checksum: 103580 095f061de8c350ae2141924b7529ed45 http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_mipsel.deb Size/MD5 checksum: 51218 794ae7a598cdd02a60a410078562aa07 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_powerpc.deb Size/MD5 checksum: 58388 4a586a8d11c5bd2c6a8e6e8e0256e703 http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_powerpc.deb Size/MD5 checksum: 98048 d15b93fa2fe7157366dc2eb37f8492a9 http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_powerpc.deb Size/MD5 checksum: 51736 161e6dc0be6a51ab3f3f69be4dc10190 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_s390.deb Size/MD5 checksum: 58848 8c62551e8c465e2ef4e87d34f9277852 http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_s390.deb Size/MD5 checksum: 53938 099298f6cc8b72fecb4d69ba742b9611 http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_s390.deb Size/MD5 checksum: 98608 38aab54a2171cec7cf73d5cb9d1d295e sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.5.3-4.4+etch1_sparc.deb Size/MD5 checksum: 58206 be267abf6f16d40838c150374ef1fd4f http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.5.3-4.4+etch1_sparc.deb Size/MD5 checksum: 49212 3300d58324ba45d8e212c0e6b332cc9f http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.5.3-4.4+etch1_sparc.deb Size/MD5 checksum: 94000 16d5f583748d07192d25ea33fa345c05 -- Debian GNU/Linux 5.0 alias lenny -- Source archives: http://security.debian.org/pool/updates/main/f/fuse/fuse_2.7.4.orig.tar.gz Size/MD5 checksum: 506658 4879f06570d2225667534c37fea04213 http://security.debian.org/pool/updates/main/f/fuse/fuse_2.7.4-1.1+lenny1.diff.gz Size/MD5 checksum: 16066 f3a61d6fc003f1a2bf3ea9430f2c9a70 http://security.debian.org/pool/updates/main/f/fuse/fuse_2.7.4-1.1+lenny1.dsc Size/MD5 checksum: 1171 889cfc800cd72828730f8bcbd9c777d9 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_alpha.deb Size/MD5 checksum: 20556 585cf2070a4ec688247a41646795131e http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_alpha.deb Size/MD5 checksum: 131872 6955f5703677ceef1b77c75c8b34e629 http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_alpha.deb Size/MD5 checksum: 180872 c23ac8be5311ee40fc3f1890b1a3ffb7 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_amd64.deb Size/MD5 checksum: 19042 36f5db5328ff4532c28c14bd956fb8c1 http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_amd64.deb Size/MD5 checksum: 129696 0ab699969dfd5437c91af3cafd9a27b2 http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_amd64.deb Size/MD5 checksum: 162514 1d0f908363d1f1d8910b9b029bf1c5df arm architecture (ARM) http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_arm.deb Size/MD5 checksum: 120050 1e1d2c35d13b5b610de23a51d6d6c365 http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_arm.deb Size/MD5 checksum: 153696 46442d428f85f1354b1ae6661e65d561 http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_arm.deb Size/MD5 checksum: 17432 a9c572365292b5113af0f3a894215ed4 armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_armel.deb Size/MD5 checksum: 17058 33f5fecaf1bac301e0521ec410e8c80e http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_armel.deb Size/MD5 checksum: 154480 c6e475b074e17c79edf3ff5eb7f9040a http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_armel.deb Size/MD5 checksum: 121306 eafcfc5360cc53e3981e1dc9b37e4b89 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_hppa.deb Size/MD5 checksum: 19296 e10df02c43836209f2b5f6584356a92c http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_hppa.deb Size/MD5 checksum: 168740 738e2595ce106f27007e822015d18165 http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_hppa.deb Size/MD5 checksum: 131642 d7b2a7892867d4ec2864f735ab2cf0b2 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_i386.deb Size/MD5 checksum: 124622 443691cc6cff7d375d3e58fc6ef7b6d0 http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_i386.deb Size/MD5 checksum: 155244 1d33eb00f1912b128fa225e4032e6272 http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_i386.deb Size/MD5 checksum: 17894 fc0807ee515177aec7ebf4e90cd28262 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_ia64.deb Size/MD5 checksum: 190582 9abc959eb6696a72b65378cfde3b2d19 http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_ia64.deb Size/MD5 checksum: 24858 7955ac00698ff5d247020e6f71e0b482 http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_ia64.deb Size/MD5 checksum: 151516 2efac5863ec97b2c378b34ac2fae5c8d mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_mips.deb Size/MD5 checksum: 18146 1fc317ba48a3258b059fe881d372690a http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_mips.deb Size/MD5 checksum: 169262 a23d47c215a0f7af9ece5a36abeb954e http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_mips.deb Size/MD5 checksum: 124082 a4b3ee554ee279fe3fea8828918d9f21 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_mipsel.deb Size/MD5 checksum: 168578 9dd6e832747412dbc9cd25f80693c3cb http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_mipsel.deb Size/MD5 checksum: 18128 598595bc8251b576c17fcb7e549033be http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_mipsel.deb Size/MD5 checksum: 123686 f0f2d7dd0022ecb02815054d2599cf7e powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_powerpc.deb Size/MD5 checksum: 19598 302d9576bcc31ca2cbd197d4acdc9937 http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_powerpc.deb Size/MD5 checksum: 131390 1edf1966d7d720723e605172c988efc8 http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_powerpc.deb Size/MD5 checksum: 161734 c4ae4d50ee835cd87e8ffbc2083a6f9f s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_s390.deb Size/MD5 checksum: 162644 68e1ef64d38ea794a096f142e6fefb5c http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_s390.deb Size/MD5 checksum: 131750 c727c3d3652f50e366c6208d05d2087b http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_s390.deb Size/MD5 checksum: 18780 75791fd3ebd09343e21baa7664425abd sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.7.4-1.1+lenny1_sparc.deb Size/MD5 checksum: 153900 17372c54b216f06f37622154f69477ff http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.7.4-1.1+lenny1_sparc.deb Size/MD5 checksum: 120200 45a7e205d213ba40869c74f8d6caf9e7 http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.7.4-1.1+lenny1_sparc.deb Size/MD5 checksum: 17974 47802bb266babbf313f1d285f6aad652 ORIGINAL ADVISORY: DSA-1989-1: http://lists.debian.org/debian-security-announce/2010/msg00028.html OTHER REFERENCES: SA38261: http://secunia.com/advisories/38261/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------