---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Fedora update for kernel SECUNIA ADVISORY ID: SA26917 VERIFY ADVISORY: http://secunia.com/advisories/26917/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Fedora 7 http://secunia.com/product/15552/ DESCRIPTION: Fedora has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. For more information: SA26934 SOLUTION: Apply updated packages. 839a2c89fa889ea161925ebed760b65dd7c0203d kernel-doc-2.6.22.7-85.fc7.noarch.rpm de6fb353dda8d27260e1778aa9fe080af914900e kernel-headers-2.6.22.7-85.fc7.i386.rpm 05d809317dfa483163a846f2f06eaf716dba54ad kernel-PAE-2.6.22.7-85.fc7.i686.rpm 73d65210e0aa3f05379b6d991a9801e032525fa6 kernel-PAE-debug-2.6.22.7-85.fc7.i686.rpm 3fe7077f88b47a915669a1eb388b0a21fd80f235 kernel-debug-debuginfo-2.6.22.7-85.fc7.i686.rpm 4f8992092a0d5075d8f66f425f903354bea6d09b kernel-PAE-devel-2.6.22.7-85.fc7.i686.rpm a303515ae16fa847a24b65101a7903059b757268 kernel-debuginfo-2.6.22.7-85.fc7.i686.rpm 4c8153e7c38f61d4cf251e4cda39767e0773a202 kernel-PAE-debug-devel-2.6.22.7-85.fc7.i686.rpm 3420d59336172c7e489ebb11b830471a96ec8c32 kernel-2.6.22.7-85.fc7.i686.rpm 56ca0006755b8630c148a738290a78633fc9f6d0 kernel-PAE-debug-debuginfo-2.6.22.7-85.fc7.i686.rpm 59885ec00e356e7cc0434871c4e728225c2aa1ea kernel-PAE-debuginfo-2.6.22.7-85.fc7.i686.rpm e93021f2e2026d0a892ce086854df7b2ddd71fdc kernel-debug-devel-2.6.22.7-85.fc7.i686.rpm 551ae9b0627ca7a778f93b6b7663da4707952887 kernel-debuginfo-common-2.6.22.7-85.fc7.i686.rpm ac078b54a159e97f6eba05ac6ec6a1cec990ab39 kernel-devel-2.6.22.7-85.fc7.i686.rpm d12be20a518e734422569534128e978e970187f8 kernel-debug-2.6.22.7-85.fc7.i686.rpm 09c13881593f7f0fd1e9332a85153a427c4c06ea kernel-kdump-2.6.22.7-85.fc7.ppc64.rpm dc3b14be3a1ecde06890e11a84c45fda3847dfab kernel-kdump-debuginfo-2.6.22.7-85.fc7.ppc64.rpm 00c0dc41bd41b509962e46929234d87716548063 kernel-headers-2.6.22.7-85.fc7.ppc64.rpm 6037cacc541ec598eb6e84d3e5cce1f96d24e174 kernel-kdump-devel-2.6.22.7-85.fc7.ppc64.rpm fc1876b23483de452e3f1d6b4421d4aba2029570 kernel-2.6.22.7-85.fc7.ppc64.rpm 00eb0bab014192ab2363953c3aa90baa1d6999b5 kernel-debuginfo-common-2.6.22.7-85.fc7.ppc64.rpm e262ddc6e1e4d42b3078c8190811cfc62201b6e0 kernel-debuginfo-2.6.22.7-85.fc7.ppc64.rpm 9de1e56d5fc7d090b3b8e9d07c69add832595267 kernel-devel-2.6.22.7-85.fc7.ppc64.rpm 37c53e64066598499d54e1993385b493c95fb283 kernel-debuginfo-common-2.6.22.7-85.fc7.i586.rpm a220523fda05cc2af10bfedf30ef84b83549581f kernel-debuginfo-2.6.22.7-85.fc7.i586.rpm 6061a58b331b02a95e78f98da377fc87aebc81a8 kernel-2.6.22.7-85.fc7.i586.rpm 8da378581eba8be4e6e75415238bcddbd833460b kernel-devel-2.6.22.7-85.fc7.i586.rpm f331b8381dfa9bf86f2150f9a3f2a8dbc8c62de4 kernel-devel-2.6.22.7-85.fc7.x86_64.rpm 01c84f2f7b679076348534a6c2e574b6f8fecefe kernel-debuginfo-common-2.6.22.7-85.fc7.x86_64.rpm 3a0e0fbf9dc7941bae28c31546ceb2ca3b06b0bc kernel-debuginfo-2.6.22.7-85.fc7.x86_64.rpm af6d0c3cb26128465326b25a91452484771cb244 kernel-2.6.22.7-85.fc7.x86_64.rpm e813d4ad5d8996c6b233d9db67769b26dda503d7 kernel-debug-2.6.22.7-85.fc7.x86_64.rpm 98bea7527290153a090dd510fc09bc0d1a01b6db kernel-debug-devel-2.6.22.7-85.fc7.x86_64.rpm b0c297dc3c74111e7033a05698bfe0838ce65a78 kernel-debug-debuginfo-2.6.22.7-85.fc7.x86_64.rpm 11ab750d65df289467497e283d398d0149aba481 kernel-headers-2.6.22.7-85.fc7.x86_64.rpm e9dc2f2fe24eb17badb684f1ae5e18fbbca32ff9 kernel-smp-2.6.22.7-85.fc7.ppc.rpm 9e4da3ba6e6b316a3cde3c63b4d2169c81ba95ff kernel-headers-2.6.22.7-85.fc7.ppc.rpm f46f8d1fd8aa33300de9f76ae9f3f49049e62ff3 kernel-smp-debuginfo-2.6.22.7-85.fc7.ppc.rpm 493637d66df0a667a444d0ee5367864dd3207656 kernel-smp-devel-2.6.22.7-85.fc7.ppc.rpm 12d2d9f25d25c1c6d913ab620a84d773e2e37e69 kernel-debuginfo-2.6.22.7-85.fc7.ppc.rpm f471cd86891a128617a8ccc9de79d40e13540db2 kernel-devel-2.6.22.7-85.fc7.ppc.rpm 6fb272857d982d24d3452f77a448a17e8bea521c kernel-debuginfo-common-2.6.22.7-85.fc7.ppc.rpm 753641e0248e7c5939cabf09f9c39db92647e7fc kernel-2.6.22.7-85.fc7.ppc.rpm 8834424ecd2d3c3fddf855767a65e51b970a065d kernel-2.6.22.7-85.fc7.src.rpm ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00375.html OTHER REFERENCES: SA26934: http://secunia.com/advisories/26934/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------