----------------------------------------------------------------------

Bist Du interessiert an einem neuen Job in IT-Sicherheit?


Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/

----------------------------------------------------------------------

TITLE:
Fedora update for kernel

SECUNIA ADVISORY ID:
SA16608

VERIFY ADVISORY:
http://secunia.com/advisories/16608/

CRITICAL:
Less critical

IMPACT:
Security Bypass

WHERE:
Local system

OPERATING SYSTEM:
Fedora Core 4
http://secunia.com/product/5251/
Fedora Core 3
http://secunia.com/product/4222/

DESCRIPTION:
Fedora has issued an update for the kernel. This fixes a
vulnerability, which can be exploited by malicious, local users to
bypass certain security restrictions.

For more information:
SA16494

SOLUTION:
Apply updated packages.

Fedora Core 3:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/

753df12a49a38a9f3a09d29476aaff31 
SRPMS/kernel-2.6.12-1.1376_FC3.src.rpm
98239a277a4d0407e8a2b341c10afd7f 
x86_64/kernel-2.6.12-1.1376_FC3.x86_64.rpm
9f10115a728f0f47c27812e940be4dc5 
x86_64/kernel-smp-2.6.12-1.1376_FC3.x86_64.rpm
1eed8cfb77a26a83ce1997b551cfef0c
x86_64/debug/kernel-debuginfo-2.6.12-1.1376_FC3.x86_64.rpm
efd44f4e12ae365f4a789bf37de211d3 
x86_64/kernel-doc-2.6.12-1.1376_FC3.noarch.rpm
4c5cc76e85bed920b58d7f2218f2b503 
i386/kernel-2.6.12-1.1376_FC3.i586.rpm
5929676dc3cb7e98e636ed8a786530cf 
i386/kernel-smp-2.6.12-1.1376_FC3.i586.rpm
073d020e4a1d6a7fccb1fae5edf10849 
i386/debug/kernel-debuginfo-2.6.12-1.1376_FC3.i586.rpm
0dd7e645d472df5902d51a4c633f315f 
i386/kernel-2.6.12-1.1376_FC3.i686.rpm
6e4672a0ff6f336489f8240c2097019a 
i386/kernel-smp-2.6.12-1.1376_FC3.i686.rpm
ce4442efd8edc5e3cd2af383c9862127 
i386/debug/kernel-debuginfo-2.6.12-1.1376_FC3.i686.rpm
efd44f4e12ae365f4a789bf37de211d3 
i386/kernel-doc-2.6.12-1.1376_FC3.noarch.rpm

Fedora Core 4:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/

f865ad76db429f63ac1bf7bdf832e55b 
SRPMS/kernel-2.6.12-1.1447_FC4.src.rpm
648cbbb6eba90c28438fe5ce983f276b 
ppc/kernel-2.6.12-1.1447_FC4.ppc.rpm
113f8fc4e635137e2e733636d3987aa0 
ppc/kernel-devel-2.6.12-1.1447_FC4.ppc.rpm
700022469101d7b36637329fa3cad79a 
ppc/kernel-smp-2.6.12-1.1447_FC4.ppc.rpm
ba9e46586510d306bcccd34434066b9e 
ppc/kernel-smp-devel-2.6.12-1.1447_FC4.ppc.rpm
3b6433e888c76f4f95b2e183f340561d 
ppc/debug/kernel-debuginfo-2.6.12-1.1447_FC4.ppc.rpm
8b3ac8ca1a781c10713180a0740c2547 
ppc/kernel-2.6.12-1.1447_FC4.ppc64.rpm
831e67fb5c0564b17e1724f8ef8f17b2 
ppc/kernel-devel-2.6.12-1.1447_FC4.ppc64.rpm
1b70224af322b0af165e2a45b7d8c956 
ppc/kernel-2.6.12-1.1447_FC4.ppc64iseries.rpm
0d779a02c47a2ebb48074d4ca2e5d7a5 
ppc/kernel-devel-2.6.12-1.1447_FC4.ppc64iseries.rpm
5b0e3e8de7ff40b7fd6cb66b415d5701 
x86_64/kernel-2.6.12-1.1447_FC4.x86_64.rpm
fbad3a0cc7421cf1fe19b3592ee71cbe 
x86_64/kernel-devel-2.6.12-1.1447_FC4.x86_64.rpm
87ac8412d75adc796050f60efb72964a 
x86_64/kernel-smp-2.6.12-1.1447_FC4.x86_64.rpm
760fb1745aba2f93daf46156d248e9a6 
x86_64/kernel-smp-devel-2.6.12-1.1447_FC4.x86_64.rpm
348ed73152c6837c0fcd4819c96a458e
x86_64/debug/kernel-debuginfo-2.6.12-1.1447_FC4.x86_64.rpm
4b247f0141b5de649f25c905418178f5 
x86_64/kernel-doc-2.6.12-1.1447_FC4.noarch.rpm
451145a445be6310ec261d72de5a097a 
i386/kernel-2.6.12-1.1447_FC4.i586.rpm
279e6474bb29df58a046de1373572684 
i386/kernel-devel-2.6.12-1.1447_FC4.i586.rpm
727229e153f886405f53fa9a2aaac47f 
i386/debug/kernel-debuginfo-2.6.12-1.1447_FC4.i586.rpm
513bc2f58e33465b895a229c2f2d7cea 
i386/kernel-2.6.12-1.1447_FC4.i686.rpm
a564cb8c227ed5be8052696d90627b00 
i386/kernel-devel-2.6.12-1.1447_FC4.i686.rpm
6627ee6a0b5be936114b033d7f11ba50 
i386/kernel-smp-2.6.12-1.1447_FC4.i686.rpm
5b43c01ee82477ae04db6270d34801bf 
i386/kernel-smp-devel-2.6.12-1.1447_FC4.i686.rpm
a1f0ef8f638fd33aff5db7a015c9d687 
i386/kernel-xen0-2.6.12-1.1447_FC4.i686.rpm
ee5f74131f5e32b8142b8554a6e92885 
i386/kernel-xen0-devel-2.6.12-1.1447_FC4.i686.rpm
e529cbe54194868937feb008a6d105da 
i386/kernel-xenU-2.6.12-1.1447_FC4.i686.rpm
d80754a9a5bee95cab45729eed47f2c5 
i386/kernel-xenU-devel-2.6.12-1.1447_FC4.i686.rpm
6c8dfced541a5a40f432d7c037c8d780 
i386/debug/kernel-debuginfo-2.6.12-1.1447_FC4.i686.rpm
4b247f0141b5de649f25c905418178f5 
i386/kernel-doc-2.6.12-1.1447_FC4.noarch.rpm

OTHER REFERENCES:
SA16494:
http://secunia.com/advisories/16494/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------