TITLE: Fedora update for libgda SECUNIA ADVISORY ID: SA17500 VERIFY ADVISORY: http://secunia.com/advisories/17500/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 3 http://secunia.com/product/4222/ DESCRIPTION: Fedora has issued an update for libgda. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. For more information: SA17323 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ 5bbe1fd316f3d73a69f2bf1d2c91b360 SRPMS/libgda-1.0.4-3.1.src.rpm 4bcd6b4701e97749fc5d4bd4b744b7e4 x86_64/libgda-1.0.4-3.1.x86_64.rpm dd07589bca360c30e1c31e0977fa4eff x86_64/libgda-devel-1.0.4-3.1.x86_64.rpm b8eb2c524070622b7710642331b57aa5 x86_64/gda-mysql-1.0.4-3.1.x86_64.rpm 72079129f4d5d7f0e2f84c8b2caefb8e x86_64/gda-odbc-1.0.4-3.1.x86_64.rpm 8b42050ae43d3e66281bce5675bbcee3 x86_64/gda-postgres-1.0.4-3.1.x86_64.rpm 0e58e8eb0a6f9e27a80135664d4accd3 x86_64/debug/libgda-debuginfo-1.0.4-3.1.x86_64.rpm b5b37d00eef0f7f5b53ae606ec21fc03 x86_64/libgda-1.0.4-3.1.i386.rpm b5b37d00eef0f7f5b53ae606ec21fc03 i386/libgda-1.0.4-3.1.i386.rpm bd5eb250a165274fbbae7720ec0c83e8 i386/libgda-devel-1.0.4-3.1.i386.rpm 35b06a0016b2ea5713229a44571b3f4c i386/gda-mysql-1.0.4-3.1.i386.rpm 25c8169519e55fc743625ff790c11c62 i386/gda-odbc-1.0.4-3.1.i386.rpm 12f7f6e510df7dab515f0d18aca90fd1 i386/gda-postgres-1.0.4-3.1.i386.rpm 68ccc27d29771906d33913dd6d14e300 i386/debug/libgda-debuginfo-1.0.4-3.1.i386.rpm OTHER REFERENCES: SA17323: http://secunia.com/advisories/17323/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------