---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Fedora update for kernel SECUNIA ADVISORY ID: SA16608 VERIFY ADVISORY: http://secunia.com/advisories/16608/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: Local system OPERATING SYSTEM: Fedora Core 4 http://secunia.com/product/5251/ Fedora Core 3 http://secunia.com/product/4222/ DESCRIPTION: Fedora has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions. For more information: SA16494 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ 753df12a49a38a9f3a09d29476aaff31 SRPMS/kernel-2.6.12-1.1376_FC3.src.rpm 98239a277a4d0407e8a2b341c10afd7f x86_64/kernel-2.6.12-1.1376_FC3.x86_64.rpm 9f10115a728f0f47c27812e940be4dc5 x86_64/kernel-smp-2.6.12-1.1376_FC3.x86_64.rpm 1eed8cfb77a26a83ce1997b551cfef0c x86_64/debug/kernel-debuginfo-2.6.12-1.1376_FC3.x86_64.rpm efd44f4e12ae365f4a789bf37de211d3 x86_64/kernel-doc-2.6.12-1.1376_FC3.noarch.rpm 4c5cc76e85bed920b58d7f2218f2b503 i386/kernel-2.6.12-1.1376_FC3.i586.rpm 5929676dc3cb7e98e636ed8a786530cf i386/kernel-smp-2.6.12-1.1376_FC3.i586.rpm 073d020e4a1d6a7fccb1fae5edf10849 i386/debug/kernel-debuginfo-2.6.12-1.1376_FC3.i586.rpm 0dd7e645d472df5902d51a4c633f315f i386/kernel-2.6.12-1.1376_FC3.i686.rpm 6e4672a0ff6f336489f8240c2097019a i386/kernel-smp-2.6.12-1.1376_FC3.i686.rpm ce4442efd8edc5e3cd2af383c9862127 i386/debug/kernel-debuginfo-2.6.12-1.1376_FC3.i686.rpm efd44f4e12ae365f4a789bf37de211d3 i386/kernel-doc-2.6.12-1.1376_FC3.noarch.rpm Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ f865ad76db429f63ac1bf7bdf832e55b SRPMS/kernel-2.6.12-1.1447_FC4.src.rpm 648cbbb6eba90c28438fe5ce983f276b ppc/kernel-2.6.12-1.1447_FC4.ppc.rpm 113f8fc4e635137e2e733636d3987aa0 ppc/kernel-devel-2.6.12-1.1447_FC4.ppc.rpm 700022469101d7b36637329fa3cad79a ppc/kernel-smp-2.6.12-1.1447_FC4.ppc.rpm ba9e46586510d306bcccd34434066b9e ppc/kernel-smp-devel-2.6.12-1.1447_FC4.ppc.rpm 3b6433e888c76f4f95b2e183f340561d ppc/debug/kernel-debuginfo-2.6.12-1.1447_FC4.ppc.rpm 8b3ac8ca1a781c10713180a0740c2547 ppc/kernel-2.6.12-1.1447_FC4.ppc64.rpm 831e67fb5c0564b17e1724f8ef8f17b2 ppc/kernel-devel-2.6.12-1.1447_FC4.ppc64.rpm 1b70224af322b0af165e2a45b7d8c956 ppc/kernel-2.6.12-1.1447_FC4.ppc64iseries.rpm 0d779a02c47a2ebb48074d4ca2e5d7a5 ppc/kernel-devel-2.6.12-1.1447_FC4.ppc64iseries.rpm 5b0e3e8de7ff40b7fd6cb66b415d5701 x86_64/kernel-2.6.12-1.1447_FC4.x86_64.rpm fbad3a0cc7421cf1fe19b3592ee71cbe x86_64/kernel-devel-2.6.12-1.1447_FC4.x86_64.rpm 87ac8412d75adc796050f60efb72964a x86_64/kernel-smp-2.6.12-1.1447_FC4.x86_64.rpm 760fb1745aba2f93daf46156d248e9a6 x86_64/kernel-smp-devel-2.6.12-1.1447_FC4.x86_64.rpm 348ed73152c6837c0fcd4819c96a458e x86_64/debug/kernel-debuginfo-2.6.12-1.1447_FC4.x86_64.rpm 4b247f0141b5de649f25c905418178f5 x86_64/kernel-doc-2.6.12-1.1447_FC4.noarch.rpm 451145a445be6310ec261d72de5a097a i386/kernel-2.6.12-1.1447_FC4.i586.rpm 279e6474bb29df58a046de1373572684 i386/kernel-devel-2.6.12-1.1447_FC4.i586.rpm 727229e153f886405f53fa9a2aaac47f i386/debug/kernel-debuginfo-2.6.12-1.1447_FC4.i586.rpm 513bc2f58e33465b895a229c2f2d7cea i386/kernel-2.6.12-1.1447_FC4.i686.rpm a564cb8c227ed5be8052696d90627b00 i386/kernel-devel-2.6.12-1.1447_FC4.i686.rpm 6627ee6a0b5be936114b033d7f11ba50 i386/kernel-smp-2.6.12-1.1447_FC4.i686.rpm 5b43c01ee82477ae04db6270d34801bf i386/kernel-smp-devel-2.6.12-1.1447_FC4.i686.rpm a1f0ef8f638fd33aff5db7a015c9d687 i386/kernel-xen0-2.6.12-1.1447_FC4.i686.rpm ee5f74131f5e32b8142b8554a6e92885 i386/kernel-xen0-devel-2.6.12-1.1447_FC4.i686.rpm e529cbe54194868937feb008a6d105da i386/kernel-xenU-2.6.12-1.1447_FC4.i686.rpm d80754a9a5bee95cab45729eed47f2c5 i386/kernel-xenU-devel-2.6.12-1.1447_FC4.i686.rpm 6c8dfced541a5a40f432d7c037c8d780 i386/debug/kernel-debuginfo-2.6.12-1.1447_FC4.i686.rpm 4b247f0141b5de649f25c905418178f5 i386/kernel-doc-2.6.12-1.1447_FC4.noarch.rpm OTHER REFERENCES: SA16494: http://secunia.com/advisories/16494/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------