TITLE: Fedora update for texinfo SECUNIA ADVISORY ID: SA17211 VERIFY ADVISORY: http://secunia.com/advisories/17211/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Fedora Core 4 http://secunia.com/product/5251/ Fedora Core 3 http://secunia.com/product/4222/ DESCRIPTION: Fedora has issued an update for texinfo. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. For more information: SA16816 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ 22460b89314708f1a06144e1c47034f4 SRPMS/texinfo-4.8-2.2.src.rpm 8f24c8388f77e4aae686ffca6d6b638d x86_64/texinfo-4.8-2.2.x86_64.rpm 5e7feb055712d27dc87911776a704115 x86_64/info-4.8-2.2.x86_64.rpm 1610a6c4c12aec49867e40a67681da7a x86_64/debug/texinfo-debuginfo-4.8-2.2.x86_64.rpm 2cdc8b87544ae6cdb76a77d5f8cbd31c i386/texinfo-4.8-2.2.i386.rpm bd1cb11c0d71734cf132277b5f170628 i386/info-4.8-2.2.i386.rpm a4b176d9c9fd286babd8a063a65d00d4 i386/debug/texinfo-debuginfo-4.8-2.2.i386.rpm Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ 10e51e319c3b894a5a0c6e046e9ac9bb SRPMS/texinfo-4.8-4.1.src.rpm 759b73cdedc10bbfd5526992ca58ca4b ppc/texinfo-4.8-4.1.ppc.rpm 224565f4e89ecd79a221775947470c78 ppc/info-4.8-4.1.ppc.rpm 716d455ba001af5b6f64b2469acf8428 ppc/debug/texinfo-debuginfo-4.8-4.1.ppc.rpm 85df5755e653ea3576881f289a71c6b5 x86_64/texinfo-4.8-4.1.x86_64.rpm 1fad02bc5ef64c71f40c899ad24ba1b3 x86_64/info-4.8-4.1.x86_64.rpm af423ce685205538879f7e3007b4c674 x86_64/debug/texinfo-debuginfo-4.8-4.1.x86_64.rpm cb219820133c9d9bca3e388540cd8afa i386/texinfo-4.8-4.1.i386.rpm fe645c668710b85f407c762ec6f56f37 i386/info-4.8-4.1.i386.rpm 14a5ac3918bf8312fa39482cb7bdf5b5 i386/debug/texinfo-debuginfo-4.8-4.1.i386.rpm OTHER REFERENCES: SA16816: http://secunia.com/advisories/16816/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------