---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Fedora update for kdebase SECUNIA ADVISORY ID: SA27096 VERIFY ADVISORY: http://secunia.com/advisories/27096/ CRITICAL: Less critical IMPACT: Security Bypass, Spoofing WHERE: >From remote OPERATING SYSTEM: Fedora Core 6 http://secunia.com/product/12487/ DESCRIPTION: Fedora has issued an update for kdebase. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to conduct spoofing attacks. For more information: SA26091 SA26351 SA26894 SOLUTION: Apply updated packages. 92d47cced043d1ca11ae2cd3f77de565cfc37466 SRPMS/kdebase-3.5.7-1.fc6.src.rpm 92d47cced043d1ca11ae2cd3f77de565cfc37466 noarch/kdebase-3.5.7-1.fc6.src.rpm 6c6ef2112c714725adb2bfa7561d778bc76914dc ppc/kdebase-3.5.7-1.fc6.ppc.rpm 17597bc0aa22d290c8fc061319b167e12218cd92 ppc/kdebase-devel-3.5.7-1.fc6.ppc.rpm 45cc366f9691c32af6aa21df409c0dbd65515b3a ppc/debug/kdebase-debuginfo-3.5.7-1.fc6.ppc.rpm c01481035e2e06fd44e6d3aee81fb7dfcd93e30b x86_64/debug/kdebase-debuginfo-3.5.7-1.fc6.x86_64.rpm 879b9625a1d7cb605ad454e9df57bddc3f9beb86 x86_64/kdebase-devel-3.5.7-1.fc6.x86_64.rpm 602f5e440ae35a8ee662dc97d7353c19ccb268b3 x86_64/kdebase-3.5.7-1.fc6.x86_64.rpm ffc98459e8d299a146f10dfb0367bb5523538587 i386/kdebase-3.5.7-1.fc6.i386.rpm da730538464d5085fb9fd821885f4d3b4137f76b i386/debug/kdebase-debuginfo-3.5.7-1.fc6.i386.rpm 9b786c165ce884d2c94054acd42f37ee69b92cf7 i386/kdebase-devel-3.5.7-1.fc6.i386.rpm ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00084.html OTHER REFERENCES: SA26091: http://secunia.com/advisories/26091/ SA26351: http://secunia.com/advisories/26351/ SA26894: http://secunia.com/advisories/26894/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------