---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Fedora update for ed SECUNIA ADVISORY ID: SA23848 VERIFY ADVISORY: http://secunia.com/advisories/23848/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Fedora Core 5 http://secunia.com/product/8808/ Fedora Core 6 http://secunia.com/product/12487/ DESCRIPTION: Fedora has issued an update for ed. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. For more information: SA23832 SOLUTION: Apply updated packages. -- Fedora Core 5 -- 9c8c3f00315691dc4798db3b78ae8f3b7c295c83 SRPMS/ed-0.3-0.fc5.src.rpm 9c8c3f00315691dc4798db3b78ae8f3b7c295c83 noarch/ed-0.3-0.fc5.src.rpm 552f8e86e87a6a18e87391254708d03489b605e9 ppc/ed-0.3-0.fc5.ppc.rpm ac075368fa6a72a4ea1cec9e8bff96aff40ce207 ppc/debug/ed-debuginfo-0.3-0.fc5.ppc.rpm 648a953c78633ca03ec62a84918f38edb7d84be4 x86_64/debug/ed-debuginfo-0.3-0.fc5.x86_64.rpm 055702c32e66d69ea29c574473108dcb1d1d4690 x86_64/ed-0.3-0.fc5.x86_64.rpm c01e509f15c15cf6079a30905c2efe97b5d7b5f1 i386/ed-0.3-0.fc5.i386.rpm 7862e469c45143db756ccd18d2e0c7b642292dfa i386/debug/ed-debuginfo-0.3-0.fc5.i386.rpm -- Fedora Core 6 -- 47730cf2c5aa2bd241e424b7d3dc7c6118dcd067 SRPMS/ed-0.3-0.fc6.src.rpm 47730cf2c5aa2bd241e424b7d3dc7c6118dcd067 noarch/ed-0.3-0.fc6.src.rpm 71b5ebdd2129a63c96ae0fa12f9ccde29278c525 ppc/ed-0.3-0.fc6.ppc.rpm d7b363546e9969f7caa9f093b18a092a7ba1fbea ppc/debug/ed-debuginfo-0.3-0.fc6.ppc.rpm 55143d29039faa3a6040d81c4d3fadce99d0b456 x86_64/debug/ed-debuginfo-0.3-0.fc6.x86_64.rpm f9893f29a13a3ea65f2906794e4cfacd3abf0e0e x86_64/ed-0.3-0.fc6.x86_64.rpm f746a7b947c043ec0abfb13822e70758dcfa394f i386/ed-0.3-0.fc6.i386.rpm e7c7edf29f57cfe5ce5e9c654c9a539f4ddb33e7 i386/debug/ed-debuginfo-0.3-0.fc6.i386.rpm ORIGINAL ADVISORY: http://fedoranews.org/cms/node/2449 http://fedoranews.org/cms/node/2450 OTHER REFERENCES: SA23832: http://secunia.com/advisories/23832/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------