TITLE: Fedora update for kernel SECUNIA ADVISORY ID: SA17280 VERIFY ADVISORY: http://secunia.com/advisories/17280/ CRITICAL: Less critical IMPACT: Exposure of sensitive information, Privilege escalation, DoS WHERE: >From local network OPERATING SYSTEM: Fedora Core 4 http://secunia.com/product/5251/ Fedora Core 3 http://secunia.com/product/4222/ DESCRIPTION: Fedora has issued an update for the kernel. This fixes some vulnerabilities, a security issue, and a weakness, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) and bypass certain security restrictions, or by malicious people to disclose certain sensitive information. For more information: SA17114 SA17261 SOLUTION: Apply updated packages: Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ b318d73186fd0fd67d766ed99a94cec4 SRPMS/kernel-2.6.12-1.1380_FC3.src.rpm ff038e4704db0ee2db693d050099be8f x86_64/kernel-2.6.12-1.1380_FC3.x86_64.rpm 09286bbbde2549cd1900c457a2e3d660 x86_64/kernel-smp-2.6.12-1.1380_FC3.x86_64.rpm 523374734813254de7467001ee674466 x86_64/debug/kernel-debuginfo-2.6.12-1.1380_FC3.x86_64.rpm 445848618621530b6cc7baad2ef26d19 x86_64/kernel-doc-2.6.12-1.1380_FC3.noarch.rpm d4a8de75b9266120516aa5b98c6e487d i386/kernel-2.6.12-1.1380_FC3.i586.rpm 3d73f07924f5bbfde019a125973d6629 i386/kernel-smp-2.6.12-1.1380_FC3.i586.rpm 3184729a9389d73853b45821a7f4e7c1 i386/debug/kernel-debuginfo-2.6.12-1.1380_FC3.i586.rpm 033ec1afcf74a67ef3bd0406683fc94d i386/kernel-2.6.12-1.1380_FC3.i686.rpm ad156d8dd242346a518319402cde0025 i386/kernel-smp-2.6.12-1.1380_FC3.i686.rpm 8e1448a177888193f6db238f842acb92 i386/debug/kernel-debuginfo-2.6.12-1.1380_FC3.i686.rpm 445848618621530b6cc7baad2ef26d19 i386/kernel-doc-2.6.12-1.1380_FC3.noarch.rpm Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ 0f7703b95fb10eea8ba98fe867b82420 SRPMS/kernel-2.6.13-1.1532_FC4.src.rpm 7e3ad0a0e7a6e37cbae3776000e11c33 ppc/kernel-2.6.13-1.1532_FC4.ppc.rpm 3f2a8e75dac0cec3c90b034d7383611c ppc/kernel-devel-2.6.13-1.1532_FC4.ppc.rpm d19ec852ccbc3690abf31d9c9c6a9760 ppc/kernel-smp-2.6.13-1.1532_FC4.ppc.rpm 062795f1071ac14c3be8550a8dea7da1 ppc/kernel-smp-devel-2.6.13-1.1532_FC4.ppc.rpm 155ef19342f4e6a2f7101571d94a806b ppc/debug/kernel-debuginfo-2.6.13-1.1532_FC4.ppc.rpm 7a6512ba50c89027f29f9ee6287b0c52 ppc/kernel-2.6.13-1.1532_FC4.ppc64.rpm de5f9dbd2f92c109e6716f0be46ee927 ppc/kernel-devel-2.6.13-1.1532_FC4.ppc64.rpm 927afe801c27c63b978b56301874741e x86_64/kernel-2.6.13-1.1532_FC4.x86_64.rpm 39e31c3cd1e3d1fc0ac5d28883b4bc08 x86_64/kernel-devel-2.6.13-1.1532_FC4.x86_64.rpm 7fb1e1c29c22272094f69f91698b3445 x86_64/kernel-smp-2.6.13-1.1532_FC4.x86_64.rpm 5f6ba16565169dd9c20273a0ce834b1b x86_64/kernel-smp-devel-2.6.13-1.1532_FC4.x86_64.rpm 14c9b85f3373eb754d2611a450eff2ef x86_64/debug/kernel-debuginfo-2.6.13-1.1532_FC4.x86_64.rpm cfe12770e33239b793e4546f773d1c0a x86_64/kernel-doc-2.6.13-1.1532_FC4.noarch.rpm e69850944046a4d0e3ebca7e9e5733ad i386/kernel-2.6.13-1.1532_FC4.i586.rpm e1bf283bb61abfbf567ea9580020cda5 i386/kernel-devel-2.6.13-1.1532_FC4.i586.rpm e1e6f867ff5f53b084c00cb5bc4bcba0 i386/debug/kernel-debuginfo-2.6.13-1.1532_FC4.i586.rpm 02b9690c11f38be3b2b524c22d975812 i386/kernel-2.6.13-1.1532_FC4.i686.rpm 2da650f41f0f5cfa360a447f8d81f676 i386/kernel-devel-2.6.13-1.1532_FC4.i686.rpm 756af7f9309326f6ee1535feb9a67ff2 i386/kernel-smp-2.6.13-1.1532_FC4.i686.rpm 4a3027b0eb9aa06447d64f12c63af92b i386/kernel-smp-devel-2.6.13-1.1532_FC4.i686.rpm 5bbf11f714cda26731276905919e9d95 i386/kernel-xen0-2.6.13-1.1532_FC4.i686.rpm d69f77d7176ba9d8f8d4950bcf1160df i386/kernel-xen0-devel-2.6.13-1.1532_FC4.i686.rpm ac59450e8d94759a27c3e3b4a3ee5284 i386/kernel-xenU-2.6.13-1.1532_FC4.i686.rpm 73ed6e93745c5a45133e00de78606a53 i386/kernel-xenU-devel-2.6.13-1.1532_FC4.i686.rpm 835e768c70b2469e828a2086cdca588b i386/debug/kernel-debuginfo-2.6.13-1.1532_FC4.i686.rpm cfe12770e33239b793e4546f773d1c0a i386/kernel-doc-2.6.13-1.1532_FC4.noarch.rpm OTHER REFERENCES: SA17114: http://secunia.com/advisories/17114/ SA17261: http://secunia.com/advisories/17261/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------