---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Fedora update for kernel SECUNIA ADVISORY ID: SA28628 VERIFY ADVISORY: http://secunia.com/advisories/28628/ CRITICAL: Less critical IMPACT: Security Bypass, Manipulation of data WHERE: Local system OPERATING SYSTEM: Fedora 8 http://secunia.com/product/16769/ DESCRIPTION: Fedora has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions and corrupt a file system. For more information: SA28485 SOLUTION: Apply updated packages. 06da561d9fc503ca57da4da53fc9bdae320a2c7f kernel-doc-2.6.23.14-107.fc8.noarch.rpm e8b9a80cd4bc7a3382059f166ee021d210ff14e0 kernel-headers-2.6.23.14-107.fc8.i386.rpm 369860e0ffc47784368d9dc896b1b04990ce8e61 kernel-debug-debuginfo-2.6.23.14-107.fc8.i686.rpm ff75102e13d2a08db574c98862ad11dfb774c4e9 kernel-debug-devel-2.6.23.14-107.fc8.i686.rpm cd3f931c772886318ed4d8b46b574813ba41b27a kernel-debug-2.6.23.14-107.fc8.i686.rpm c48709687cfdbd6fcecca9029500ed3a2017d8ab kernel-PAE-debug-debuginfo-2.6.23.14-107.fc8.i686.rpm 195ec1eb54ef312a70d88b676839a0b258d71993 kernel-PAE-debug-devel-2.6.23.14-107.fc8.i686.rpm b11def51bc1724f5439a92b21ae98fad0f283672 kernel-PAE-debug-2.6.23.14-107.fc8.i686.rpm 90567b15de41f12000eb6b4fee2d9c0e7b9f2814 kernel-PAE-debuginfo-2.6.23.14-107.fc8.i686.rpm 4ca63e108928cbcfac8c1827eb2310faad6feae5 kernel-PAE-devel-2.6.23.14-107.fc8.i686.rpm b1873b27233c9a2e5a15fdcd79421c5c5ec96697 kernel-PAE-2.6.23.14-107.fc8.i686.rpm 98d2df237a1cc00c1a30ebc02f907905cc21fde8 kernel-debuginfo-2.6.23.14-107.fc8.i686.rpm 201f5ad2ee2d1e10ae02329a1eed4462f7bba083 kernel-devel-2.6.23.14-107.fc8.i686.rpm fa9cfd9c1b4a5fedc8206794cf7d4660112a17b8 kernel-debuginfo-common-2.6.23.14-107.fc8.i686.rpm 48f92a5e510acd65aa6cd77d906028b81a4ea159 kernel-2.6.23.14-107.fc8.i686.rpm 13f6ac639eb427271c022af89d4bd4e7fc6759bc kernel-kdump-debuginfo-2.6.23.14-107.fc8.ppc64.rpm a368ba1f775781ba29fd2d29444dd5537c674ef1 kernel-kdump-devel-2.6.23.14-107.fc8.ppc64.rpm 71c3c2c73b20cbca3082dd09c583196bef418509 kernel-kdump-2.6.23.14-107.fc8.ppc64.rpm 83cca6b6cc045be1b18d1eec861adf70c2fa25cc kernel-debuginfo-2.6.23.14-107.fc8.ppc64.rpm 4b640d07ce471dab18299577d67aeb837a9123ad kernel-devel-2.6.23.14-107.fc8.ppc64.rpm 73a87dddcf59f888c0655d2d533abe46d7ed9b65 kernel-debuginfo-common-2.6.23.14-107.fc8.ppc64.rpm 426e90cc9292efd64cdba8e5ac4983d01c3f0b4e kernel-headers-2.6.23.14-107.fc8.ppc64.rpm 4d9a3c05e4a252bb72a3836c4c80e05921ca4d7d kernel-2.6.23.14-107.fc8.ppc64.rpm ec2f19d389bf04f3b59fe1640a2f1486c9342a94 kernel-debuginfo-2.6.23.14-107.fc8.i586.rpm 5f3f2b71a22a733847ce24e144e515dd34668398 kernel-devel-2.6.23.14-107.fc8.i586.rpm 22e143c8adbf66711cfd906ed723b49230869a57 kernel-debuginfo-common-2.6.23.14-107.fc8.i586.rpm 9c551bf1a2e6067b9edb4c8da81c456af65cafd6 kernel-2.6.23.14-107.fc8.i586.rpm ed08cfe857c483e59235bc4b7a2dcfb58bb98c75 kernel-debug-debuginfo-2.6.23.14-107.fc8.x86_64.rpm 7babf39c6b03a07bf1645fdc15f3a3c7396b4ffc kernel-debug-devel-2.6.23.14-107.fc8.x86_64.rpm 88f5e45b355895509b9df0d9904d4957d40c255e kernel-debug-2.6.23.14-107.fc8.x86_64.rpm dc4a05d164e0f89a689e700cd345fd2e5271ad62 kernel-debuginfo-2.6.23.14-107.fc8.x86_64.rpm 69b2a9ecefb954191d8a5d7360e44333d4adbaef kernel-devel-2.6.23.14-107.fc8.x86_64.rpm 7d30626d81c121fa28baa8d22a0060fd0fb5a082 kernel-debuginfo-common-2.6.23.14-107.fc8.x86_64.rpm 192a0a45233472305834d22cfe0767dc7eec9b45 kernel-headers-2.6.23.14-107.fc8.x86_64.rpm ad677cd49c15bc91ec169f88e8d0c2f368c9f76a kernel-2.6.23.14-107.fc8.x86_64.rpm 04bbe480a090425227623567c574e3beffee9555 kernel-smp-debuginfo-2.6.23.14-107.fc8.ppc.rpm 5d030cf66afc844cd1340dbcdffb2250e21d9d97 kernel-smp-devel-2.6.23.14-107.fc8.ppc.rpm cf2ffa348fd6d147f0b8b097aa766a187c064232 kernel-smp-2.6.23.14-107.fc8.ppc.rpm 74490bcb1dc034e262c7c538f94f40982a36dfec kernel-debuginfo-2.6.23.14-107.fc8.ppc.rpm 51611593fe9094b0de18357a97a67fdd0197caea kernel-devel-2.6.23.14-107.fc8.ppc.rpm 350d69fa9c418f68ca5f1f59cfb84b2bec962279 kernel-debuginfo-common-2.6.23.14-107.fc8.ppc.rpm 6cb1184c0fc22833de3ea82688596d0bbc74341d kernel-headers-2.6.23.14-107.fc8.ppc.rpm 505251cb55055b393d4b776c0c0c15df4d50eb85 kernel-2.6.23.14-107.fc8.ppc.rpm c09a9f55bebea7ef005e37d1c83bd4a48d093486 kernel-2.6.23.14-107.fc8.src.rpm ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00828.html OTHER REFERENCES: SA28485: http://secunia.com/advisories/28485/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------