---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Fedora update for kernel SECUNIA ADVISORY ID: SA24178 VERIFY ADVISORY: http://secunia.com/advisories/24178/ CRITICAL: Not critical IMPACT: DoS WHERE: Local system OPERATING SYSTEM: Fedora Core 6 http://secunia.com/product/12487/ DESCRIPTION: Fedora has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). For more information: SA24109 SOLUTION: Apply updated packages. 41fb09223a7545482a2ebf728cc501a58f80ab1f SRPMS/kernel-2.6.19-1.2911.fc6.src.rpm 41fb09223a7545482a2ebf728cc501a58f80ab1f noarch/kernel-2.6.19-1.2911.fc6.src.rpm 1acb3fdf2052961890e4197b12c06f0d5dc5ce7c ppc/kernel-smp-2.6.19-1.2911.fc6.ppc.rpm 647699340478041a9774f1efcef236d33bbb9c99 ppc/debug/kernel-debuginfo-2.6.19-1.2911.fc6.ppc.rpm 2f0e37054df699e7dc1fec074b318df21672c26a ppc/kernel-2.6.19-1.2911.fc6.ppc.rpm 31f30b94ebec67799798d73b65b2659e4c8f2132 ppc/kernel-devel-2.6.19-1.2911.fc6.ppc.rpm bc0d14726ee353778f1ea10cf0211c262205a5d8 ppc/kernel-smp-devel-2.6.19-1.2911.fc6.ppc.rpm ced125163f33ef8b2287ad57b538626e67f8c7e3 ppc/debug/kernel-debuginfo-common-2.6.19-1.2911.fc6.ppc.rpm b7101b43d76d1f4f4dac56b31d48d9627ec8746e ppc/kernel-headers-2.6.19-1.2911.fc6.ppc.rpm 176413cc2c52c7aec86517afb70f2d00631b2c08 ppc/debug/kernel-smp-debuginfo-2.6.19-1.2911.fc6.ppc.rpm 33a4c58891144ede66f2d1e51d82be73c93cb44d ppc/kernel-doc-2.6.19-1.2911.fc6.noarch.rpm 4d88537ca6b73c28cfd9cfcc87542530732de3c8 x86_64/debug/kernel-debuginfo-common-2.6.19-1.2911.fc6.x86_64.rpm f2556ebc8dd084c9921365d4d13e7e123d52ff43 x86_64/kernel-2.6.19-1.2911.fc6.x86_64.rpm 906e05688bc348c68594f5ee74b3576a6aebcbb0 x86_64/debug/kernel-debug-debuginfo-2.6.19-1.2911.fc6.x86_64.rpm 2eb755dca4240d35f213dd139043ce47de4b6cc0 x86_64/kernel-headers-2.6.19-1.2911.fc6.x86_64.rpm 62c12d6979a5c53da0556c382f71ee08df607680 x86_64/debug/kernel-xen-debuginfo-2.6.19-1.2911.fc6.x86_64.rpm 7ddd7405d997c0582c6c1d4a734476dc09a63224 x86_64/debug/kernel-kdump-debuginfo-2.6.19-1.2911.fc6.x86_64.rpm f30d90d13bf8bc6e219b188c40386ed818685cea x86_64/kernel-kdump-2.6.19-1.2911.fc6.x86_64.rpm 78c16642735820b929bda250b716e1cb30428f2a x86_64/debug/kernel-debuginfo-2.6.19-1.2911.fc6.x86_64.rpm 33fd8e9646dc6aed8c91fad0707c7a763ffa0160 x86_64/kernel-kdump-devel-2.6.19-1.2911.fc6.x86_64.rpm 0ba2fb1da116abbfa4fab9830d329cd0ee3241df x86_64/kernel-devel-2.6.19-1.2911.fc6.x86_64.rpm 789036ac83195cf70db572812643699bbc58f962 x86_64/kernel-xen-devel-2.6.19-1.2911.fc6.x86_64.rpm de123bb493183346a6edda79ec1abc5e0ab7b94e x86_64/kernel-debug-2.6.19-1.2911.fc6.x86_64.rpm 34be6930ac3290c4effae1eab33914b06c16f3fc x86_64/kernel-debug-devel-2.6.19-1.2911.fc6.x86_64.rpm 97df5f60ed7bc4f0c25c563aed456c8b3651f516 x86_64/kernel-xen-2.6.19-1.2911.fc6.x86_64.rpm 33a4c58891144ede66f2d1e51d82be73c93cb44d x86_64/kernel-doc-2.6.19-1.2911.fc6.noarch.rpm d4ee2347eb2a0d6be948338be7ea69e49736a206 i386/kernel-headers-2.6.19-1.2911.fc6.i386.rpm 21503f2f4e85f56a2c3ea7310e6559bace825760 i386/debug/kernel-debuginfo-2.6.19-1.2911.fc6.i586.rpm 5dd7c5e632ae85d3260cf98e705c455cce2186ce i386/kernel-devel-2.6.19-1.2911.fc6.i586.rpm 8d6ff8cb289288e8d1e96318ac1d0685651dc48c i386/debug/kernel-debuginfo-common-2.6.19-1.2911.fc6.i586.rpm bd749a9cc16c319e2ca5a1ca4f01d355c7489589 i386/kernel-2.6.19-1.2911.fc6.i586.rpm 905984e63ad5cab2786f87b28f4910087eb679ec i386/kernel-debug-2.6.19-1.2911.fc6.i686.rpm f9e72e30819809591cfef130739a6e65a4ee3c36 i386/kernel-PAE-2.6.19-1.2911.fc6.i686.rpm 1488aaa922259132c0d2af52acf12b3b3718f9cd i386/kernel-devel-2.6.19-1.2911.fc6.i686.rpm 4f7aba0dc344486e7aae55e88177d12151592591 i386/debug/kernel-debug-debuginfo-2.6.19-1.2911.fc6.i686.rpm e45e484694b341bef776fd0ce90bc9a7781299c4 i386/debug/kernel-kdump-debuginfo-2.6.19-1.2911.fc6.i686.rpm e87a05be464ee3ac2215d61916b93a3e03e7f43d i386/kernel-PAE-devel-2.6.19-1.2911.fc6.i686.rpm 041626de060b6b3c235c1b6adef5ad8e8163e02c i386/debug/kernel-debuginfo-2.6.19-1.2911.fc6.i686.rpm bfc06c8375cfe6323f4fbd7442039582fe37ac77 i386/kernel-xen-2.6.19-1.2911.fc6.i686.rpm 5a44638cf6e1c704780ca9f2cb677a6bccf71d64 i386/debug/kernel-PAE-debug-debuginfo-2.6.19-1.2911.fc6.i686.rpm 9fb89d362407258b87789ce5256f516feab1bc09 i386/kernel-kdump-devel-2.6.19-1.2911.fc6.i686.rpm a3812a63b073e621acd1dc5bec80061d07b8fd86 i386/kernel-debug-devel-2.6.19-1.2911.fc6.i686.rpm 50e2a7f10d8752b7c5039fcfe022761b15712cd3 i386/kernel-PAE-debug-devel-2.6.19-1.2911.fc6.i686.rpm 71465f7ec250c5b317a98b1ed5b039724ec7f106 i386/debug/kernel-debuginfo-common-2.6.19-1.2911.fc6.i686.rpm 5ea729590ab8a9bf3baad5f18b40b17b045b1665 i386/debug/kernel-PAE-debuginfo-2.6.19-1.2911.fc6.i686.rpm 470fe194defbdbef66fd688c23c3e4bc538558be i386/debug/kernel-xen-debuginfo-2.6.19-1.2911.fc6.i686.rpm 82b80d190eff2c8a363be0b118039797c2d2074f i386/kernel-xen-devel-2.6.19-1.2911.fc6.i686.rpm 9dba0d600839a14c851476cc832723583cb17a80 i386/kernel-PAE-debug-2.6.19-1.2911.fc6.i686.rpm bcc056df5689acbc9358f491af13bde8e5c0e424 i386/kernel-2.6.19-1.2911.fc6.i686.rpm 7ab373da19c2e70860f0deee5253c5bca312497d i386/kernel-kdump-2.6.19-1.2911.fc6.i686.rpm 33a4c58891144ede66f2d1e51d82be73c93cb44d i386/kernel-doc-2.6.19-1.2911.fc6.noarch.rpm ORIGINAL ADVISORY: http://fedoranews.org/cms/node/2648 OTHER REFERENCES: SA24109: http://secunia.com/advisories/24109/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------