---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Fedora update for kernel SECUNIA ADVISORY ID: SA27919 VERIFY ADVISORY: http://secunia.com/advisories/27919/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Fedora 8 http://secunia.com/product/16769/ DESCRIPTION: Fedora has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service). For more information: SA27664 SOLUTION: Apply updated packages. 6140d70dbb8468d1cdcd00e6fe3dfb46e7466771 kernel-doc-2.6.23.8-63.fc8.noarch.rpm 0c00785e3aeb0846caf75c1703c3686a5bea8368 kernel-headers-2.6.23.8-63.fc8.i386.rpm 0bafc448fabdcf70e95f125f58be55f1fd0b362f kernel-devel-2.6.23.8-63.fc8.i686.rpm 10dee08f80eeb692f181f0f4f6cc0ed77b0d37df kernel-PAE-devel-2.6.23.8-63.fc8.i686.rpm 755801f581478ea3e43107f39a3a539c069bb38b kernel-debug-devel-2.6.23.8-63.fc8.i686.rpm ed0644137365e1a71e4060614aad4fbbb41f0afe kernel-debug-debuginfo-2.6.23.8-63.fc8.i686.rpm 359adaba24af220de3450c1704d042ddbcf91213 kernel-PAE-debug-devel-2.6.23.8-63.fc8.i686.rpm 608ea8cf11596384aec931b2af627fbfa9b74784 kernel-debug-2.6.23.8-63.fc8.i686.rpm 910f688de9fdfeb8b23671d2839a6806b8257f29 kernel-debuginfo-2.6.23.8-63.fc8.i686.rpm e268e11f6599bad80fa5e4d6203eef5de8c527b0 kernel-2.6.23.8-63.fc8.i686.rpm a77c162840b45ca352b74eda15784793225b2a58 kernel-PAE-debug-debuginfo-2.6.23.8-63.fc8.i686.rpm ddda299e3b32d79824e86e7ca188514645fdfd28 kernel-PAE-2.6.23.8-63.fc8.i686.rpm dcec0463a12213880684a936b29e01e377c1abe8 kernel-PAE-debug-2.6.23.8-63.fc8.i686.rpm b2e9225b736154a133a1b1516d96b9a0248daafb kernel-debuginfo-common-2.6.23.8-63.fc8.i686.rpm f598ffaef0cfe9e7a6edc6288af7fcc7444c9de4 kernel-PAE-debuginfo-2.6.23.8-63.fc8.i686.rpm ad0fa3203b087e454dac566541d8cb6d119d776e kernel-2.6.23.8-63.fc8.ppc64.rpm 7fe1c423323a36a932bc6cd2f3f0b83f8d11d362 kernel-debuginfo-2.6.23.8-63.fc8.ppc64.rpm b7b09c8a89b8f6d328a823c5f31710b4ff277f1c kernel-devel-2.6.23.8-63.fc8.ppc64.rpm 4e23ec9c1510d5349d3420157267631e6fb471bb kernel-debuginfo-common-2.6.23.8-63.fc8.ppc64.rpm a03f8077565b7ed512a62d2ea683b378a1ff6963 kernel-kdump-devel-2.6.23.8-63.fc8.ppc64.rpm 505601dd6062c0a58acf521efe55a57f5cc897d6 kernel-headers-2.6.23.8-63.fc8.ppc64.rpm 5da6a91b59e9be1225aad9e6446da3ffb91e4a8d kernel-kdump-debuginfo-2.6.23.8-63.fc8.ppc64.rpm 3f333ef1e6b78afadfdd88e8c37b6ea5854568b6 kernel-kdump-2.6.23.8-63.fc8.ppc64.rpm cf2f4ab64fe3bb69271e13039940df8f3c3ec0fd kernel-2.6.23.8-63.fc8.i586.rpm 014dfdec0df418bbeb5931bffead3475a4ac3644 kernel-devel-2.6.23.8-63.fc8.i586.rpm 7e1d2aa54e9bfbb45e5c4766601530caf5f5bd21 kernel-debuginfo-common-2.6.23.8-63.fc8.i586.rpm d9331c4820bcff69327144d6ec580878c7435ffe kernel-debuginfo-2.6.23.8-63.fc8.i586.rpm a32535e4788ed493608a779b6a2d7d82ae9e594d kernel-debug-debuginfo-2.6.23.8-63.fc8.x86_64.rpm 476affdcb90c27a3e15e9e73f29d6390aa5b9fa4 kernel-debug-devel-2.6.23.8-63.fc8.x86_64.rpm a10089e358e3c4ec5cd739a56abf31705feaf9fb kernel-devel-2.6.23.8-63.fc8.x86_64.rpm 715ad01e8944c7d048c95bf7ce849d77c8e6b3cd kernel-debuginfo-common-2.6.23.8-63.fc8.x86_64.rpm 416b9918778523233257ebe22d9f43c18d5a0c04 kernel-debuginfo-2.6.23.8-63.fc8.x86_64.rpm 42f8db490ab4cdf1db69acec3ca7b426b0d5c027 kernel-debug-2.6.23.8-63.fc8.x86_64.rpm 65ea18df433d1ce29cff7fffb4b1e6ccf85fde3f kernel-headers-2.6.23.8-63.fc8.x86_64.rpm 3acc764e85488b593084928ecddb3ed6e120c32e kernel-2.6.23.8-63.fc8.x86_64.rpm 72009a1c1d40c454e2b4562472a5fc1228f2cc2f kernel-smp-devel-2.6.23.8-63.fc8.ppc.rpm 9e3f8ef27264a487c00027ca6e7a8fdd163fa63c kernel-debuginfo-common-2.6.23.8-63.fc8.ppc.rpm eb37c3cccf3c2eed5c622a922801d0e8d7c66f2b kernel-headers-2.6.23.8-63.fc8.ppc.rpm 0c59150de3e2be3bb598e4d715e07911837b42cb kernel-devel-2.6.23.8-63.fc8.ppc.rpm acbc475a1f2e258338315586865c73a55b6595e1 kernel-2.6.23.8-63.fc8.ppc.rpm 8ce50bc976808dccc3a1228208805da9e07c673d kernel-debuginfo-2.6.23.8-63.fc8.ppc.rpm bd2e13eea7f708c59c84733ebb91ee0b19caccf5 kernel-smp-debuginfo-2.6.23.8-63.fc8.ppc.rpm 8172dae20d38f1210ad18fea57ebdbb17d7dc0df kernel-smp-2.6.23.8-63.fc8.ppc.rpm 917ef103b0dfbefeb11ed1b2b5461abdc7c2f32a kernel-2.6.23.8-63.fc8.src.rpm ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00032.html OTHER REFERENCES: SA27664: http://secunia.com/advisories/27664/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------