---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Fedora update for kernel SECUNIA ADVISORY ID: SA27101 VERIFY ADVISORY: http://secunia.com/advisories/27101/ CRITICAL: Not critical IMPACT: Exposure of sensitive information WHERE: >From local network OPERATING SYSTEM: Fedora Core 6 http://secunia.com/product/12487/ DESCRIPTION: Fedora has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to disclose potentially sensitive information. For more information: SA26918 SOLUTION: Apply updated packages. 6bfa589935c52d75056b0db6239a487c94119a20 SRPMS/kernel-2.6.22.9-61.fc6.src.rpm 6bfa589935c52d75056b0db6239a487c94119a20 noarch/kernel-2.6.22.9-61.fc6.src.rpm 900928de7ed6f833892d19cfbb531b49e0827e0c ppc/debug/kernel-debuginfo-common-2.6.22.9-61.fc6.ppc.rpm 113b67089088f9d5e9b1d9e148248e8789d1424d ppc/kernel-smp-2.6.22.9-61.fc6.ppc.rpm 93bd4201c557a7014249a275dab451b1b089de7d ppc/debug/kernel-debuginfo-2.6.22.9-61.fc6.ppc.rpm d4db2348a99d5ea3e748453c53146e81d87c010a ppc/kernel-smp-devel-2.6.22.9-61.fc6.ppc.rpm 8e7453f04d2d0334d8ee125f46098981d63d6947 ppc/kernel-2.6.22.9-61.fc6.ppc.rpm c1a79c695f570549d1d7a2b3b034b6d62bdc8723 ppc/kernel-headers-2.6.22.9-61.fc6.ppc.rpm 077b9624bed755a9a9a858dc462b79886c077289 ppc/debug/kernel-smp-debuginfo-2.6.22.9-61.fc6.ppc.rpm 0201670f87fda8420dd734b6337df90a954c1727 ppc/kernel-devel-2.6.22.9-61.fc6.ppc.rpm c87f5a4dc2c220590474eaf4cff469d192a6e686 ppc/kernel-doc-2.6.22.9-61.fc6.noarch.rpm 47f84e850e19d6ecd3d04f04680cb76a9a51f8c8 x86_64/debug/kernel-debuginfo-2.6.22.9-61.fc6.x86_64.rpm 0ffe262da5d93bdb40d6c991103fb7624dccd43c x86_64/kernel-debug-devel-2.6.22.9-61.fc6.x86_64.rpm 602f5dabd36768a841627494d2df190a2f92da58 x86_64/debug/kernel-debuginfo-common-2.6.22.9-61.fc6.x86_64.rpm 77a03c75e7eaa9b4446dabe47533fb7e57f34cac x86_64/kernel-2.6.22.9-61.fc6.x86_64.rpm be8e250ce375c43a26f2e2f05beed7d6284e021a x86_64/kernel-debug-2.6.22.9-61.fc6.x86_64.rpm 433999f005f96406029cd4368d072a1bbf47445f x86_64/debug/kernel-debug-debuginfo-2.6.22.9-61.fc6.x86_64.rpm 7edb61b0e1125ad168fa51ab24bd7f560e34dd3f x86_64/kernel-devel-2.6.22.9-61.fc6.x86_64.rpm 3ec5d1012747f013512b4d7c4e09bf0daca75c7d x86_64/kernel-headers-2.6.22.9-61.fc6.x86_64.rpm c87f5a4dc2c220590474eaf4cff469d192a6e686 x86_64/kernel-doc-2.6.22.9-61.fc6.noarch.rpm 04b4a497cf229a3d470595945a204e90e0851dbe i386/kernel-headers-2.6.22.9-61.fc6.i386.rpm afe56d5b22b1aa4768bf1d5e3869afbd277a56de i386/debug/kernel-debuginfo-common-2.6.22.9-61.fc6.i586.rpm 149d9cfcd3012d88953fbfa2460a4128978d14d9 i386/kernel-devel-2.6.22.9-61.fc6.i586.rpm a1be300e03b971b934fa8f1fd548d6fcd4972fd4 i386/kernel-2.6.22.9-61.fc6.i586.rpm 941c2130772f8e0af8432f41882ed0d1f779fe87 i386/debug/kernel-debuginfo-2.6.22.9-61.fc6.i586.rpm b1447112d330f419b7367340a1d3813d361c70a5 i386/kernel-PAE-debug-2.6.22.9-61.fc6.i686.rpm e7cd2f0226075bae80c6b85a14eac0672eb6aacd i386/debug/kernel-PAE-debuginfo-2.6.22.9-61.fc6.i686.rpm 1083ae0a89130e9f81a822ed6b4c2a8fe179a6d8 i386/debug/kernel-debuginfo-common-2.6.22.9-61.fc6.i686.rpm 20324923d7078136e01229d0c9f01b952421f2e3 i386/kernel-PAE-debug-devel-2.6.22.9-61.fc6.i686.rpm f1de86cfb79ab3ecef1310c765783dc35089db3d i386/kernel-debug-2.6.22.9-61.fc6.i686.rpm e26d570b067b2d60049e5b0c264e4c042e1ba33c i386/kernel-PAE-devel-2.6.22.9-61.fc6.i686.rpm b1e6d5752ae1f9c4274ac58f1a0214320ae45928 i386/kernel-debug-devel-2.6.22.9-61.fc6.i686.rpm 7afc251b4c6b75aa4e2e1e1dc1b172ec76ce81c3 i386/kernel-2.6.22.9-61.fc6.i686.rpm a513db23efed5c23862ad218f29d3ee33afdbec3 i386/debug/kernel-debug-debuginfo-2.6.22.9-61.fc6.i686.rpm 77dbf13af68c117fb8ccbfcbd04c9335662d1c64 i386/kernel-PAE-2.6.22.9-61.fc6.i686.rpm 1cd841d1b1630c99aca8680b8cd7defa37c51cbb i386/debug/kernel-PAE-debug-debuginfo-2.6.22.9-61.fc6.i686.rpm cb99b784e4d15d1f261e9b040317b4cd409f1ddc i386/debug/kernel-debuginfo-2.6.22.9-61.fc6.i686.rpm 77e2f327440a631d72e19c16b3185513372d2a71 i386/kernel-devel-2.6.22.9-61.fc6.i686.rpm c87f5a4dc2c220590474eaf4cff469d192a6e686 i386/kernel-doc-2.6.22.9-61.fc6.noarch.rpm ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00083.html OTHER REFERENCES: SA26918: http://secunia.com/advisories/26918/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------