TITLE: Fedora update for kdebase SECUNIA ADVISORY ID: SA18139 VERIFY ADVISORY: http://secunia.com/advisories/18139/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Fedora Core 4 http://secunia.com/product/5251/ DESCRIPTION: Fedora has issued an update for kdebase. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. For more information: SA16692 SOLUTION: Apply updated packages. Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ 3ae522354985fd4c6ae332dbc062fd36 SRPMS/kdebase-3.5.0-0.1.fc4.src.rpm 4f607841760ad02efb1f4eccb9b8055c ppc/kdebase-3.5.0-0.1.fc4.ppc.rpm a4d58fcf0a852868b12d93244e9fe031 ppc/kdebase-devel-3.5.0-0.1.fc4.ppc.rpm c899857226297837883defa00216e750 ppc/debug/kdebase-debuginfo-3.5.0-0.1.fc4.ppc.rpm f8e666fe5b9279403cb48a22c0b5dfa1 ppc/kdebase-3.5.0-0.1.fc4.ppc64.rpm db2dced145111a59035000701b6576a7 x86_64/kdebase-3.5.0-0.1.fc4.x86_64.rpm ea6b1e33901242baa6d08b064dd7481c x86_64/kdebase-devel-3.5.0-0.1.fc4.x86_64.rpm cb04db35bdff061f0f487cdaa1e009ea x86_64/debug/kdebase-debuginfo-3.5.0-0.1.fc4.x86_64.rpm d668ffed1162b79b50941e2679c9c061 x86_64/kdebase-3.5.0-0.1.fc4.i386.rpm d668ffed1162b79b50941e2679c9c061 i386/kdebase-3.5.0-0.1.fc4.i386.rpm fe4a06847e20b830010ac7b3e9b1fc56 i386/kdebase-devel-3.5.0-0.1.fc4.i386.rpm 01e06561665ca4878e7b2e63236ae989 i386/debug/kdebase-debuginfo-3.5.0-0.1.fc4.i386.rpm OTHER REFERENCES: SA16692: http://secunia.com/advisories/16692/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------