---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Fedora update for kernel SECUNIA ADVISORY ID: SA26919 VERIFY ADVISORY: http://secunia.com/advisories/26919/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Fedora Core 6 http://secunia.com/product/12487/ DESCRIPTION: Fedora has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. For more information: SA26934 SOLUTION: Apply updated packages. 307d4c4bc87817c6f046980d2db6e4997532946c SRPMS/kernel-2.6.22.7-57.fc6.src.rpm 307d4c4bc87817c6f046980d2db6e4997532946c noarch/kernel-2.6.22.7-57.fc6.src.rpm 3537c28ac03a191397774765057eecedbd943425 ppc/debug/kernel-smp-debuginfo-2.6.22.7-57.fc6.ppc.rpm dd5f85d13646e37f85dbf594ba85b2c8e129a9ff ppc/debug/kernel-debuginfo-common-2.6.22.7-57.fc6.ppc.rpm 9d99dbc63288c512811ec4b439efc3abefa2a339 ppc/debug/kernel-debuginfo-2.6.22.7-57.fc6.ppc.rpm d67ff2f189aa2af9b8bb95b961ad71a2da55320a ppc/kernel-2.6.22.7-57.fc6.ppc.rpm 5606e49938945e50566eb38f16b173623dead93e ppc/kernel-headers-2.6.22.7-57.fc6.ppc.rpm b38053ec9aff231359c4fb63b4e614144c7d9a39 ppc/kernel-smp-2.6.22.7-57.fc6.ppc.rpm 457b4c4cffa2005f7ea5b66901424d8f6f692a2e ppc/kernel-smp-devel-2.6.22.7-57.fc6.ppc.rpm ec69f81e1d1077ac4a2bc8edbe28690e15dfe743 ppc/kernel-devel-2.6.22.7-57.fc6.ppc.rpm 9a8440a4d10dcec759918b20ab45950898aff3d4 ppc/kernel-doc-2.6.22.7-57.fc6.noarch.rpm bacf8c08ea00d924ba1b03298fada2355417db9c x86_64/debug/kernel-debug-debuginfo-2.6.22.7-57.fc6.x86_64.rpm 299b15b40dee3e8683044aa0fa270f126c8ef042 x86_64/kernel-2.6.22.7-57.fc6.x86_64.rpm 8396190a2e8ecd703e324a3b41cd5e7ec69175de x86_64/kernel-debug-devel-2.6.22.7-57.fc6.x86_64.rpm 94c5a2a8eccdda11355b05eca4916d9330fa390d x86_64/kernel-debug-2.6.22.7-57.fc6.x86_64.rpm 4439c204ee71e82a53b082235d9ff19f3cf1c0d1 x86_64/kernel-devel-2.6.22.7-57.fc6.x86_64.rpm 330b1ee33d26907aadafe72ddac8abfc2815ccae x86_64/debug/kernel-debuginfo-2.6.22.7-57.fc6.x86_64.rpm 6f6e6d6dd2c7a279451976c7f0051776fef1c09e x86_64/debug/kernel-debuginfo-common-2.6.22.7-57.fc6.x86_64.rpm 11ae68aff63a7a92535586a8f46074e2637e973f x86_64/kernel-headers-2.6.22.7-57.fc6.x86_64.rpm 9a8440a4d10dcec759918b20ab45950898aff3d4 x86_64/kernel-doc-2.6.22.7-57.fc6.noarch.rpm 8a503d2deabee3f9324425803820e1ba0ca18f14 i386/kernel-headers-2.6.22.7-57.fc6.i386.rpm ada23859a089d52e5994b2a21bf3700c3206aa14 i386/debug/kernel-debuginfo-common-2.6.22.7-57.fc6.i586.rpm 3d6a87e001ae1f8392b48813d1d59503392d54df i386/kernel-devel-2.6.22.7-57.fc6.i586.rpm 5a75b168d93644e89e7fb1301fc969b66c0a6e06 i386/debug/kernel-debuginfo-2.6.22.7-57.fc6.i586.rpm 9cf8d58305002e94b4a7061970629af551e41fc8 i386/kernel-2.6.22.7-57.fc6.i586.rpm e2c541ed37ab0389b014cc5f80f0ab5e3d5d40ac i386/kernel-devel-2.6.22.7-57.fc6.i686.rpm 5e111db97ec59b98144dc5cadeaeedfc859c1ed8 i386/kernel-debug-2.6.22.7-57.fc6.i686.rpm c38da48e178c12265c9f0ef13e5ac124441bf65f i386/debug/kernel-PAE-debuginfo-2.6.22.7-57.fc6.i686.rpm 6969396b2964a7fa52b165c6ab3390829fe87d05 i386/debug/kernel-debuginfo-common-2.6.22.7-57.fc6.i686.rpm 8ae8a76f1e159d1864e6a5b78b3a7045a6653794 i386/debug/kernel-debug-debuginfo-2.6.22.7-57.fc6.i686.rpm 747bea5d2b29fc28e50570ab4198743d5e04c7a9 i386/debug/kernel-PAE-debug-debuginfo-2.6.22.7-57.fc6.i686.rpm 4fee714ecc736ef9476eb9cbf9428b38182c6fb1 i386/kernel-debug-devel-2.6.22.7-57.fc6.i686.rpm 14a6fe76300046e01edb683739f0d85b0fe1227b i386/debug/kernel-debuginfo-2.6.22.7-57.fc6.i686.rpm bd1631d26aa198d202e12cb468a80e1626894b05 i386/kernel-PAE-debug-2.6.22.7-57.fc6.i686.rpm 42c1795a59c4627d3398ac9d9132ef9e88406ea1 i386/kernel-PAE-debug-devel-2.6.22.7-57.fc6.i686.rpm 314c8aa584f0142c518a104ef9abd22aaa29d1c9 i386/kernel-PAE-devel-2.6.22.7-57.fc6.i686.rpm 09ed664a6e82e5e8030bb8df070777b50ed5dd4d i386/kernel-PAE-2.6.22.7-57.fc6.i686.rpm ebb9d5d6f89ee73823b002804506cb55bff3462d i386/kernel-2.6.22.7-57.fc6.i686.rpm 9a8440a4d10dcec759918b20ab45950898aff3d4 i386/kernel-doc-2.6.22.7-57.fc6.noarch.rpm ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00355.html OTHER REFERENCES: SA26934: http://secunia.com/advisories/26934/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------