TITLE: Fedora update for kernel SECUNIA ADVISORY ID: SA17995 VERIFY ADVISORY: http://secunia.com/advisories/17995/ CRITICAL: Less critical IMPACT: Privilege escalation, DoS WHERE: Local system OPERATING SYSTEM: Fedora Core 4 http://secunia.com/product/5251/ DESCRIPTION: Fedora has issued an update for the kernel. This fixes some vulnerabilities, which potentially can be exploited by malicious, local users to gain escalated privileges and to cause a DoS (Denial of Service). For more information: SA17226 SA17786 SOLUTION: Apply updated packages. Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ 9a69f839642e2b98d21f5b24d1863a29 SRPMS/kernel-2.6.14-1.1653_FC4.src.rpm 8a37d17b0a6afdc90f2d0461db3d8689 ppc/kernel-2.6.14-1.1653_FC4.ppc.rpm 519c0dd926b52f3ac32a751f9185e4ca ppc/kernel-devel-2.6.14-1.1653_FC4.ppc.rpm 29ad65bb074c1a8bef80792097ad275f ppc/kernel-smp-2.6.14-1.1653_FC4.ppc.rpm ff407935584726a7407cde4adc35425f ppc/kernel-smp-devel-2.6.14-1.1653_FC4.ppc.rpm 3b08817bf2538be0f8ffcd0c8af32213 ppc/debug/kernel-debuginfo-2.6.14-1.1653_FC4.ppc.rpm a6ca3e28ac004632d2965a4dbbd49f62 ppc/kernel-2.6.14-1.1653_FC4.ppc64.rpm 10510de835349ddfc0bc8cb8f244e32e ppc/kernel-devel-2.6.14-1.1653_FC4.ppc64.rpm 450fffa42b2206a57ea09f75abb4081b x86_64/kernel-2.6.14-1.1653_FC4.x86_64.rpm a3c6cd931daa7ba84d3ca56b1c48481f x86_64/kernel-devel-2.6.14-1.1653_FC4.x86_64.rpm 0a2685588ec1e84cbaf2ffbaa5d36238 x86_64/kernel-smp-2.6.14-1.1653_FC4.x86_64.rpm cfe121c6622169b62bc71306fb950898 x86_64/kernel-smp-devel-2.6.14-1.1653_FC4.x86_64.rpm e0c082c07d8052f3d7a352b21d0ea53f x86_64/debug/kernel-debuginfo-2.6.14-1.1653_FC4.x86_64.rpm 53041de394eb3d57e6649daa44569489 x86_64/kernel-doc-2.6.14-1.1653_FC4.noarch.rpm 17c9ed241f1da2d1d7b0587e549eb52d i386/kernel-2.6.14-1.1653_FC4.i586.rpm ef05501ea2137c0362972e53d70154a4 i386/kernel-devel-2.6.14-1.1653_FC4.i586.rpm 585ceba843679408db815db7bb7b75d0 i386/debug/kernel-debuginfo-2.6.14-1.1653_FC4.i586.rpm cd474c22cda65e4cb52d2e5be4f3848a i386/kernel-2.6.14-1.1653_FC4.i686.rpm b86b29b16bd6ea1cddb6d47532652af3 i386/kernel-devel-2.6.14-1.1653_FC4.i686.rpm a8237fc28a92a8ba4df3e6604f0f964a i386/kernel-smp-2.6.14-1.1653_FC4.i686.rpm 3b04054baf66e458b6d1cb46df31e803 i386/kernel-smp-devel-2.6.14-1.1653_FC4.i686.rpm bdf70e5ba9049b959d028e1d4eeca259 i386/debug/kernel-debuginfo-2.6.14-1.1653_FC4.i686.rpm 53041de394eb3d57e6649daa44569489 i386/kernel-doc-2.6.14-1.1653_FC4.noarch.rpm OTHER REFERENCES: SA17226: http://secunia.com/advisories/17226/ SA17786: http://secunia.com/advisories/17786/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------