exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 26917

Secunia Security Advisory 26917
Posted Sep 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, kernel, local
systems | linux, fedora
SHA-256 | f4eba2703a2f33c25aa54751b737178bdbbe28df50b712e768423e1cbbe8e110

Secunia Security Advisory 26917

Change Mirror Download


----------------------------------------------------------------------

Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.

Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/

----------------------------------------------------------------------

TITLE:
Fedora update for kernel

SECUNIA ADVISORY ID:
SA26917

VERIFY ADVISORY:
http://secunia.com/advisories/26917/

CRITICAL:
Less critical

IMPACT:
Privilege escalation

WHERE:
Local system

OPERATING SYSTEM:
Fedora 7
http://secunia.com/product/15552/

DESCRIPTION:
Fedora has issued an update for the kernel. This fixes a
vulnerability, which can be exploited by malicious, local users to
gain escalated privileges.

For more information:
SA26934

SOLUTION:
Apply updated packages.

839a2c89fa889ea161925ebed760b65dd7c0203d
kernel-doc-2.6.22.7-85.fc7.noarch.rpm
de6fb353dda8d27260e1778aa9fe080af914900e
kernel-headers-2.6.22.7-85.fc7.i386.rpm
05d809317dfa483163a846f2f06eaf716dba54ad
kernel-PAE-2.6.22.7-85.fc7.i686.rpm
73d65210e0aa3f05379b6d991a9801e032525fa6
kernel-PAE-debug-2.6.22.7-85.fc7.i686.rpm
3fe7077f88b47a915669a1eb388b0a21fd80f235
kernel-debug-debuginfo-2.6.22.7-85.fc7.i686.rpm
4f8992092a0d5075d8f66f425f903354bea6d09b
kernel-PAE-devel-2.6.22.7-85.fc7.i686.rpm
a303515ae16fa847a24b65101a7903059b757268
kernel-debuginfo-2.6.22.7-85.fc7.i686.rpm
4c8153e7c38f61d4cf251e4cda39767e0773a202
kernel-PAE-debug-devel-2.6.22.7-85.fc7.i686.rpm
3420d59336172c7e489ebb11b830471a96ec8c32
kernel-2.6.22.7-85.fc7.i686.rpm
56ca0006755b8630c148a738290a78633fc9f6d0
kernel-PAE-debug-debuginfo-2.6.22.7-85.fc7.i686.rpm
59885ec00e356e7cc0434871c4e728225c2aa1ea
kernel-PAE-debuginfo-2.6.22.7-85.fc7.i686.rpm
e93021f2e2026d0a892ce086854df7b2ddd71fdc
kernel-debug-devel-2.6.22.7-85.fc7.i686.rpm
551ae9b0627ca7a778f93b6b7663da4707952887
kernel-debuginfo-common-2.6.22.7-85.fc7.i686.rpm
ac078b54a159e97f6eba05ac6ec6a1cec990ab39
kernel-devel-2.6.22.7-85.fc7.i686.rpm
d12be20a518e734422569534128e978e970187f8
kernel-debug-2.6.22.7-85.fc7.i686.rpm
09c13881593f7f0fd1e9332a85153a427c4c06ea
kernel-kdump-2.6.22.7-85.fc7.ppc64.rpm
dc3b14be3a1ecde06890e11a84c45fda3847dfab
kernel-kdump-debuginfo-2.6.22.7-85.fc7.ppc64.rpm
00c0dc41bd41b509962e46929234d87716548063
kernel-headers-2.6.22.7-85.fc7.ppc64.rpm
6037cacc541ec598eb6e84d3e5cce1f96d24e174
kernel-kdump-devel-2.6.22.7-85.fc7.ppc64.rpm
fc1876b23483de452e3f1d6b4421d4aba2029570
kernel-2.6.22.7-85.fc7.ppc64.rpm
00eb0bab014192ab2363953c3aa90baa1d6999b5
kernel-debuginfo-common-2.6.22.7-85.fc7.ppc64.rpm
e262ddc6e1e4d42b3078c8190811cfc62201b6e0
kernel-debuginfo-2.6.22.7-85.fc7.ppc64.rpm
9de1e56d5fc7d090b3b8e9d07c69add832595267
kernel-devel-2.6.22.7-85.fc7.ppc64.rpm
37c53e64066598499d54e1993385b493c95fb283
kernel-debuginfo-common-2.6.22.7-85.fc7.i586.rpm
a220523fda05cc2af10bfedf30ef84b83549581f
kernel-debuginfo-2.6.22.7-85.fc7.i586.rpm
6061a58b331b02a95e78f98da377fc87aebc81a8
kernel-2.6.22.7-85.fc7.i586.rpm
8da378581eba8be4e6e75415238bcddbd833460b
kernel-devel-2.6.22.7-85.fc7.i586.rpm
f331b8381dfa9bf86f2150f9a3f2a8dbc8c62de4
kernel-devel-2.6.22.7-85.fc7.x86_64.rpm
01c84f2f7b679076348534a6c2e574b6f8fecefe
kernel-debuginfo-common-2.6.22.7-85.fc7.x86_64.rpm
3a0e0fbf9dc7941bae28c31546ceb2ca3b06b0bc
kernel-debuginfo-2.6.22.7-85.fc7.x86_64.rpm
af6d0c3cb26128465326b25a91452484771cb244
kernel-2.6.22.7-85.fc7.x86_64.rpm
e813d4ad5d8996c6b233d9db67769b26dda503d7
kernel-debug-2.6.22.7-85.fc7.x86_64.rpm
98bea7527290153a090dd510fc09bc0d1a01b6db
kernel-debug-devel-2.6.22.7-85.fc7.x86_64.rpm
b0c297dc3c74111e7033a05698bfe0838ce65a78
kernel-debug-debuginfo-2.6.22.7-85.fc7.x86_64.rpm
11ab750d65df289467497e283d398d0149aba481
kernel-headers-2.6.22.7-85.fc7.x86_64.rpm
e9dc2f2fe24eb17badb684f1ae5e18fbbca32ff9
kernel-smp-2.6.22.7-85.fc7.ppc.rpm
9e4da3ba6e6b316a3cde3c63b4d2169c81ba95ff
kernel-headers-2.6.22.7-85.fc7.ppc.rpm
f46f8d1fd8aa33300de9f76ae9f3f49049e62ff3
kernel-smp-debuginfo-2.6.22.7-85.fc7.ppc.rpm
493637d66df0a667a444d0ee5367864dd3207656
kernel-smp-devel-2.6.22.7-85.fc7.ppc.rpm
12d2d9f25d25c1c6d913ab620a84d773e2e37e69
kernel-debuginfo-2.6.22.7-85.fc7.ppc.rpm
f471cd86891a128617a8ccc9de79d40e13540db2
kernel-devel-2.6.22.7-85.fc7.ppc.rpm
6fb272857d982d24d3452f77a448a17e8bea521c
kernel-debuginfo-common-2.6.22.7-85.fc7.ppc.rpm
753641e0248e7c5939cabf09f9c39db92647e7fc
kernel-2.6.22.7-85.fc7.ppc.rpm
8834424ecd2d3c3fddf855767a65e51b970a065d
kernel-2.6.22.7-85.fc7.src.rpm

ORIGINAL ADVISORY:
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00375.html

OTHER REFERENCES:
SA26934:
http://secunia.com/advisories/26934/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close