---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Fedora update for util-linux SECUNIA ADVISORY ID: SA27188 VERIFY ADVISORY: http://secunia.com/advisories/27188/ CRITICAL: Not critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Fedora 7 http://secunia.com/product/15552/ DESCRIPTION: Fedora has issued an update for util-linux. This fixes a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. For more information: SA27145 SOLUTION: Apply updated packages. 2aedbaafdf347aa298558a56e9d9020f88e3acc4 util-linux-debuginfo-2.13-0.54.1.fc7.ppc64.rpm 67f580fe186fb81b20a88eb512c13a994b45578b util-linux-2.13-0.54.1.fc7.ppc64.rpm 15837b21fccb7a8160aa262f8c89e7c96edad4c1 util-linux-2.13-0.54.1.fc7.i386.rpm f638d85d5ca00df21ac9de9a0da03fd56a9ab8c7 util-linux-debuginfo-2.13-0.54.1.fc7.i386.rpm e6a30062c8d8047473dad04ad489c3262828eb18 util-linux-debuginfo-2.13-0.54.1.fc7.x86_64.rpm e463d60a90473d8d76dbd23e0557c91b12dbb77c util-linux-2.13-0.54.1.fc7.x86_64.rpm 86cdcf5c587ff53d897101ee157ddd626fd424fe util-linux-2.13-0.54.1.fc7.ppc.rpm 46b432df12c7f46cb49564dc06818c5fcc1c8aa0 util-linux-debuginfo-2.13-0.54.1.fc7.ppc.rpm 7f6962c44ca92c98c0a9b5b10355df7d50669b44 util-linux-2.13-0.54.1.fc7.src.rpm ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00144.html OTHER REFERENCES: SA27145: http://secunia.com/advisories/27145/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------