Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes multiple vulnerabilities and a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service), bypass certain security restrictions, and potentially gain escalated privileges and by malicious people to potentially compromise a vulnerable system
4be32124836a84419bbdc058a006d92fcfe8d044298824899865f89ccc17a2f2
----------------------------------------------------------------------
Secunia integrated with Microsoft WSUS
http://secunia.com/blog/71/
----------------------------------------------------------------------
TITLE:
Red Hat update for kernel
SECUNIA ADVISORY ID:
SA38393
VERIFY ADVISORY:
http://secunia.com/advisories/38393/
DESCRIPTION:
Red Hat has issued an update for the kernel. This fixes multiple
vulnerabilities and a security issue, which can be exploited by
malicious, local users to cause a DoS (Denial of Service), bypass
certain security restrictions, and potentially gain escalated
privileges and by malicious people to potentially compromise a
vulnerable system
For more information:
SA32320
SA37435
SA37590
SOLUTION:
Updated packages are available via Red Hat Network.
http://rhn.redhat.com
ORIGINAL ADVISORY:
RHSA-2010:0076-1:
https://rhn.redhat.com/errata/RHSA-2010-0076.html
OTHER REFERENCES:
SA32320:
http://secunia.com/advisories/32320/
SA37435:
http://secunia.com/advisories/37435/
SA37590:
http://secunia.com/advisories/37590/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------