---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Fedora Core 5 update for kernel SECUNIA ADVISORY ID: SA24135 VERIFY ADVISORY: http://secunia.com/advisories/24135/ CRITICAL: Less critical IMPACT: Manipulation of data, DoS WHERE: >From remote OPERATING SYSTEM: Fedora Core 5 http://secunia.com/product/8808/ DESCRIPTION: Fedora has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and manipulate data, and by malicious people to cause a DoS (Denial of Service). For more information: SA23349 SA23427 SA23664 SA24109 SOLUTION: Apply updated packages. 0137f81db84204c0388cc88cc8666615139c2da8 SRPMS/kernel-2.6.19-1.2288.fc5.src.rpm 0137f81db84204c0388cc88cc8666615139c2da8 noarch/kernel-2.6.19-1.2288.fc5.src.rpm 5b3136d7fc38bf4e7e7e0b905978ab28c63cb46c ppc/debug/kernel-debuginfo-2.6.19-1.2288.fc5.ppc.rpm 4dd2448e7bdcec4e81326991de61abcb321da6e5 ppc/kernel-smp-devel-2.6.19-1.2288.fc5.ppc.rpm 0284e8dd752b2eb606662de569714b908a0f1741 ppc/kernel-2.6.19-1.2288.fc5.ppc.rpm f5f6809c3bdbc7ab8b3b1776d00588e06d7125b3 ppc/kernel-smp-2.6.19-1.2288.fc5.ppc.rpm 05167f2e3c8922529d12fb4f9358a124edba6ce5 ppc/kernel-devel-2.6.19-1.2288.fc5.ppc.rpm 9c8c130762f2a7080047717abb7274f4119f8798 ppc/kernel-doc-2.6.19-1.2288.fc5.noarch.rpm 66fd9745675018fa8c5f25d9f52872fe44ab41b6 x86_64/kernel-xen0-2.6.19-1.2288.fc5.x86_64.rpm 0a35d53fc80848b0047b106a85c4d84e3d60cba2 x86_64/kernel-kdump-devel-2.6.19-1.2288.fc5.x86_64.rpm e00632987767092bac7c8d4c10ec87da60e0a165 x86_64/kernel-2.6.19-1.2288.fc5.x86_64.rpm d00bffe31b7a429e56a11bb9e4ff9c6e801112fa x86_64/kernel-kdump-2.6.19-1.2288.fc5.x86_64.rpm 0e51d1c94462ccfdc070a9c91e75ce4f6e98d11b x86_64/kernel-devel-2.6.19-1.2288.fc5.x86_64.rpm 31661722a75e3a3fd5f513b58747c8e42a454d4c x86_64/kernel-xenU-2.6.19-1.2288.fc5.x86_64.rpm 4e8c3197f857ce1d40a3a23b039e7cc42b19cb4d x86_64/kernel-xen0-devel-2.6.19-1.2288.fc5.x86_64.rpm d5d6f808f4bbb5175f4cdaca0677a8d2c94bd14d x86_64/kernel-xenU-devel-2.6.19-1.2288.fc5.x86_64.rpm 36bbc89f6bf136575b5de33f45241e0ec90d66b3 x86_64/kernel-xen-devel-2.6.19-1.2288.fc5.x86_64.rpm 3aac21a251ff410a1f8a0cbe716e128837899b6f x86_64/kernel-debug-2.6.19-1.2288.fc5.x86_64.rpm fe6901212d23d7ecf8e22dbaeedfbf463cae7322 x86_64/kernel-debug-devel-2.6.19-1.2288.fc5.x86_64.rpm 7b2c42e5a4db3d3357c884213ba0275513c55807 x86_64/debug/kernel-debuginfo-2.6.19-1.2288.fc5.x86_64.rpm 94503644c8b0dcb10655752c159e858f179eaf76 x86_64/kernel-xen-2.6.19-1.2288.fc5.x86_64.rpm 9c8c130762f2a7080047717abb7274f4119f8798 x86_64/kernel-doc-2.6.19-1.2288.fc5.noarch.rpm cb40f9b6952b666ce5f6cb573a337f3f7736794c i386/debug/kernel-debuginfo-2.6.19-1.2288.fc5.i386.rpm 3d101bb5ab113d00ad1ce96bfeedf5e593f68a30 i386/kernel-smp-2.6.19-1.2288.fc5.i586.rpm e12113eb3b52af7a1fb8868ded86968830afcfe3 i386/kernel-2.6.19-1.2288.fc5.i586.rpm 7b9631f21f9fd0277cbab143477d8c7d8991c6c1 i386/kernel-devel-2.6.19-1.2288.fc5.i586.rpm 38f477506121b179ba965486c2072545a7897961 i386/kernel-smp-devel-2.6.19-1.2288.fc5.i586.rpm 7d74ce098d0bdc23a9669ca976c3ec464f0e1ec4 i386/debug/kernel-debuginfo-2.6.19-1.2288.fc5.i586.rpm 5a56b41a3175c120c0e55280efe67956bd13830f i386/kernel-xen0-devel-2.6.19-1.2288.fc5.i686.rpm eeec6699343fc22b1864ff25335b15cf763a8e18 i386/kernel-smp-debug-2.6.19-1.2288.fc5.i686.rpm 951091984e0efa289bf77188a11dd473e15cc0d4 i386/kernel-xen0-2.6.19-1.2288.fc5.i686.rpm e9ba0e72826122d2e3182ebf62c633225da71f68 i386/kernel-debug-devel-2.6.19-1.2288.fc5.i686.rpm 1ccfc18da96ca51f8690a7a732809911822bf2d0 i386/kernel-smp-devel-2.6.19-1.2288.fc5.i686.rpm 7133c25a70042423c9263533389c56134eddbd2d i386/kernel-xen-2.6.19-1.2288.fc5.i686.rpm 49393d8a17ae79e9bc00dcae25a529ee14d73a85 i386/kernel-2.6.19-1.2288.fc5.i686.rpm 2df37544b47c99306ea41b651f1a89c27225af01 i386/kernel-kdump-devel-2.6.19-1.2288.fc5.i686.rpm b37b4c8cff25ed2cd5de0572e437ff31e4899933 i386/kernel-smp-debug-devel-2.6.19-1.2288.fc5.i686.rpm 54b4cf37db3acbef5f8a9b99fdd0df8097a63d6d i386/kernel-smp-2.6.19-1.2288.fc5.i686.rpm 6a947d3a63263a01b00afbd17c09713b9235790f i386/kernel-xenU-devel-2.6.19-1.2288.fc5.i686.rpm 5c524bf0774a144667806b20741415c844a15003 i386/debug/kernel-debuginfo-2.6.19-1.2288.fc5.i686.rpm 8f07ed7ad8dabb3cf13f3f22bffeda1b94cbd04f i386/kernel-kdump-2.6.19-1.2288.fc5.i686.rpm 4d22a04484402caf09ec7a97cd2a57fd97e3fe01 i386/kernel-devel-2.6.19-1.2288.fc5.i686.rpm 3223cadcc8fb937ca5e0ac1c68f490dab8f56be4 i386/kernel-xenU-2.6.19-1.2288.fc5.i686.rpm 96f5180be11d3922ed081844f2519cf0e5ee7e17 i386/kernel-debug-2.6.19-1.2288.fc5.i686.rpm 84c940efe2f20536463e1d47c8356d32310bd9ed i386/kernel-xen-devel-2.6.19-1.2288.fc5.i686.rpm 9c8c130762f2a7080047717abb7274f4119f8798 i386/kernel-doc-2.6.19-1.2288.fc5.noarch.rpm ORIGINAL ADVISORY: http://fedoranews.org/cms/node/2652 OTHER REFERENCES: SA23349: http://secunia.com/advisories/23349/ SA23427: http://secunia.com/advisories/23427/ SA23664: http://secunia.com/advisories/23664/ SA24109: http://secunia.com/advisories/24109/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------