----------------------------------------------------------------------

Secunia is proud to announce the availability of the Secunia Software
Inspector.

The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.

Try it out online:
http://secunia.com/software_inspector/

----------------------------------------------------------------------

TITLE:
Fedora update for ed

SECUNIA ADVISORY ID:
SA23848

VERIFY ADVISORY:
http://secunia.com/advisories/23848/

CRITICAL:
Less critical

IMPACT:
Privilege escalation

WHERE:
Local system

OPERATING SYSTEM:
Fedora Core 5
http://secunia.com/product/8808/
Fedora Core 6
http://secunia.com/product/12487/

DESCRIPTION:
Fedora has issued an update for ed. This fixes a vulnerability, which
can be exploited by malicious, local users to perform certain actions
with escalated privileges.

For more information:
SA23832

SOLUTION:
Apply updated packages.

-- Fedora Core 5 --

9c8c3f00315691dc4798db3b78ae8f3b7c295c83 
SRPMS/ed-0.3-0.fc5.src.rpm

9c8c3f00315691dc4798db3b78ae8f3b7c295c83 
noarch/ed-0.3-0.fc5.src.rpm

552f8e86e87a6a18e87391254708d03489b605e9 
ppc/ed-0.3-0.fc5.ppc.rpm
ac075368fa6a72a4ea1cec9e8bff96aff40ce207 
ppc/debug/ed-debuginfo-0.3-0.fc5.ppc.rpm

648a953c78633ca03ec62a84918f38edb7d84be4 
x86_64/debug/ed-debuginfo-0.3-0.fc5.x86_64.rpm
055702c32e66d69ea29c574473108dcb1d1d4690 
x86_64/ed-0.3-0.fc5.x86_64.rpm

c01e509f15c15cf6079a30905c2efe97b5d7b5f1 
i386/ed-0.3-0.fc5.i386.rpm
7862e469c45143db756ccd18d2e0c7b642292dfa 
i386/debug/ed-debuginfo-0.3-0.fc5.i386.rpm

-- Fedora Core 6 --

47730cf2c5aa2bd241e424b7d3dc7c6118dcd067 
SRPMS/ed-0.3-0.fc6.src.rpm

47730cf2c5aa2bd241e424b7d3dc7c6118dcd067 
noarch/ed-0.3-0.fc6.src.rpm

71b5ebdd2129a63c96ae0fa12f9ccde29278c525 
ppc/ed-0.3-0.fc6.ppc.rpm
d7b363546e9969f7caa9f093b18a092a7ba1fbea 
ppc/debug/ed-debuginfo-0.3-0.fc6.ppc.rpm

55143d29039faa3a6040d81c4d3fadce99d0b456 
x86_64/debug/ed-debuginfo-0.3-0.fc6.x86_64.rpm
f9893f29a13a3ea65f2906794e4cfacd3abf0e0e 
x86_64/ed-0.3-0.fc6.x86_64.rpm

f746a7b947c043ec0abfb13822e70758dcfa394f 
i386/ed-0.3-0.fc6.i386.rpm
e7c7edf29f57cfe5ce5e9c654c9a539f4ddb33e7 
i386/debug/ed-debuginfo-0.3-0.fc6.i386.rpm

ORIGINAL ADVISORY:
http://fedoranews.org/cms/node/2449
http://fedoranews.org/cms/node/2450

OTHER REFERENCES:
SA23832:
http://secunia.com/advisories/23832/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------