TITLE: Fedora update for kernel SECUNIA ADVISORY ID: SA19735 VERIFY ADVISORY: http://secunia.com/advisories/19735/ CRITICAL: Less critical IMPACT: Security Bypass, Exposure of sensitive information, DoS WHERE: Local system OPERATING SYSTEM: Fedora Core 5 http://secunia.com/product/8808/ DESCRIPTION: Fedora has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), gain knowledge of potentially sensitive information, or bypass certain security restrictions. For more information: SA19724 SA19709 SA19657 SA19639 SA19573 SA19495 SOLUTION: Apply patches. Fedora Core 5: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ 1b154600afd2a807861f4c345c9a0ba91fbf5989 SRPMS/kernel-2.6.16-1.2096_FC5.src.rpm 1906067ca5433c7761c6a76a39c11e32a5b46b20 ppc/kernel-2.6.16-1.2096_FC5.ppc.rpm 3c8d8545d0495e65e9c00b516dddebf06ef2a0b5 ppc/kernel-devel-2.6.16-1.2096_FC5.ppc.rpm 64ae6db0caf5775a3e11436df8e5b5c4e7815777 ppc/kernel-smp-2.6.16-1.2096_FC5.ppc.rpm 4de1464a2f01291ce5e2b484290f7b10b6efecf6 ppc/kernel-smp-devel-2.6.16-1.2096_FC5.ppc.rpm 9f2d4c3a4621fe100a877eb042c9fe20d278fbc4 ppc/debug/kernel-debuginfo-2.6.16-1.2096_FC5.ppc.rpm 4db11e08971a9811a8c44a620525fb5adefc35a7 ppc/kernel-doc-2.6.16-1.2096_FC5.noarch.rpm 8c965c4c24d66cfc44fccb9a6ee01228765bde46 x86_64/kernel-2.6.16-1.2096_FC5.x86_64.rpm 02e10a26f452e0e23d1a40675366d9ad913498af x86_64/kernel-devel-2.6.16-1.2096_FC5.x86_64.rpm f355aa8afad6ac16d8d6e8c3327f4000ee1b64c8 x86_64/kernel-xen0-2.6.16-1.2096_FC5.x86_64.rpm cbb322ec528eb7ec6993cdf30479fffb98ecd85e x86_64/kernel-xen0-devel-2.6.16-1.2096_FC5.x86_64.rpm b053231f89ecbf26478b60c605631d87bed41f25 x86_64/kernel-xenU-2.6.16-1.2096_FC5.x86_64.rpm c6a74c4bca9685f0891d27a0577cb668bb5a4432 x86_64/kernel-xenU-devel-2.6.16-1.2096_FC5.x86_64.rpm 17b8772c65f05dd5fb41266a83fed31cc25549ee x86_64/kernel-kdump-2.6.16-1.2096_FC5.x86_64.rpm 99083e54cd03824b7be0b6b978547166ab9abd4b x86_64/kernel-kdump-devel-2.6.16-1.2096_FC5.x86_64.rpm 07f7e8f40fbf27e5266f74cff7628ebca0fbe493 x86_64/debug/kernel-debuginfo-2.6.16-1.2096_FC5.x86_64.rpm 4db11e08971a9811a8c44a620525fb5adefc35a7 x86_64/kernel-doc-2.6.16-1.2096_FC5.noarch.rpm d8f1175d9a9810352ba9cca993d1a82dec945631 i386/kernel-2.6.16-1.2096_FC5.i586.rpm 9f01c5a2b65cf99d041195a82158d052bd751a96 i386/kernel-devel-2.6.16-1.2096_FC5.i586.rpm 43f54d92da6e2335f4e8f8b3aa989eccd8d37fb6 i386/kernel-smp-2.6.16-1.2096_FC5.i586.rpm 715cdc3a54439423bcad241e538c35b68de2a024 i386/kernel-smp-devel-2.6.16-1.2096_FC5.i586.rpm 8ba1e12fd323b2d260db430b20824ce0d3f98eae i386/debug/kernel-debuginfo-2.6.16-1.2096_FC5.i586.rpm c882dc2ed404175bd302d157385475ddc5bd5c6d i386/kernel-2.6.16-1.2096_FC5.i686.rpm 9a587bdf25a17749d05681fdf4de98c744868224 i386/kernel-devel-2.6.16-1.2096_FC5.i686.rpm 1b088bc589b96cf64eb76315d0594682484e49ad i386/kernel-smp-2.6.16-1.2096_FC5.i686.rpm a3eea3d7e27ac25626943f53b71efbc116c54a31 i386/kernel-smp-devel-2.6.16-1.2096_FC5.i686.rpm 971ff3b72428b8271ee7209e729e0c9aab6732a3 i386/kernel-xen0-2.6.16-1.2096_FC5.i686.rpm 020b2cf22b5f07da7814e87ef486704e2ca5b79a i386/kernel-xen0-devel-2.6.16-1.2096_FC5.i686.rpm 40addfb96fbcbf0057143c0924540e3c2202893c i386/kernel-xenU-2.6.16-1.2096_FC5.i686.rpm 8d1aecc8b068b3af03588bda31571ef7e01e7ec6 i386/kernel-xenU-devel-2.6.16-1.2096_FC5.i686.rpm 254fd25a9bff3ff70672e522977b65fe320055af i386/kernel-kdump-2.6.16-1.2096_FC5.i686.rpm 3c079c0bfaa0c986976805de62d808f19b6d5de9 i386/kernel-kdump-devel-2.6.16-1.2096_FC5.i686.rpm fa18115b142013c488d317c0e72f66ece2de8ee8 i386/debug/kernel-debuginfo-2.6.16-1.2096_FC5.i686.rpm 4db11e08971a9811a8c44a620525fb5adefc35a7 i386/kernel-doc-2.6.16-1.2096_FC5.noarch.rpm OTHER REFERENCES: SA19724: http://secunia.com/advisories/19724/ SA19709: http://secunia.com/advisories/19709/ SA19657: http://secunia.com/advisories/19657/ SA19639: http://secunia.com/advisories/19639/ SA19573: http://secunia.com/advisories/19573/ SA19495: http://secunia.com/advisories/19495/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------