|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 5 2006-338: gdm Vulnerability Assessment Details
|
Fedora Core 5 2006-338: gdm |
||
Check for the version of the gdm package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory FEDORA-2006-338 (gdm). Gdm (the GNOME Display Manager) is a highly configurable reimplementation of xdm, the X Display Manager. Gdm permits you to log into your system with the X Window System running and supports running several different X sessions on your local machine at the same time. Update Information: (Notes taken from upstream release mail) - The sockets connection between the slaves and the GDM daemon is now better managed to better ensure that sockets are never left open. (Brian Cameron) - Corrected bug that causes a core dump when you click on gdmgreeter fields that have an id. (Brian Cameron) - Add new GdmXserverTimeout configuration setting so that the length of time GDM waits for the Xserver to start can be tuned, so GDM better works with Xservers that require more than 10 seconds to start. (Emilie) - The happygnome and happygnome-list gdmgreeter themes now use the official logo. (Brian Cameron) - Now GDM configure supports --with-sysconfsubdir so that GDM's configuration directory can be configured to not have '/gdm' appended to the end. - Fix for ensuring .ICEauthority file has proper ownership/permissions. Addresses CVE-2006-1057. (Hans Petter Jansson) - Fix 'Show Actions Menu' section in gdmsetup so it appears when both 'Plain' and 'Themed' style is chosen. (Brian Cameron, Dennis Cranston) - Now use LINGUAS procedure for defining languages. (Michiel Sikkes) - Now Xsession script uses '$@' instead of '$1' so it is possible to pass arguments with the command to run. (Brian Cameron) - Add Trusted Solraris support. (Niall Power) - One line fix to Solaris auditing logic that fixes a bug causing authentication to fail when auditing is turned on. (Brian Cameron) - Fixes to compile with C99 and fixes to compile under NetBSD. Remove EXPANDED_* variables from the configure. (Julio M. Merino Vidal) - Translation updates (ýygimantas BeruÃÂka, Benoît Dejean, Laurent Dhima, Maxim Dziumanenko, Alessio Frusciante, Rhys Jones, Raphael Higino, Theppitak Karoonboonyanan, Gabor Kelmen, Priit Laes, Jordi Mallach, Kjartan Maraas, Daniel Nylander, Kostas Papdimas, Guilherme de S. Pastore, Ankit Patel, Ignacio Casal Quinteiro, Hendrik Richter, Jens Seidel, Francisco Javier F. Serrador, Alexander Shopov, Clytie Siddall, Ilkka Tuohela, Vincent van Adrighem, Tommi Vainikaninen) Solution : Get the newest Fedora Updates Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security |
||
Cables, Connectors |
Cisco 2801 Integrated Services Router ISR w/ WIC-1DSU-1-v2, VIC2-2FXS CISCO2801
$59.99
Cisco 2900 Series CISCO2951/K9 v03 Integrated Services Router
$54.99
Cisco Nexus 48-Port 10G SFP+ Switch N9K-9396PX w/ 9K-M12PQ 12-Port 40G QSFP
$249.99
Cisco 2911/K9 Integrated Service Router
$49.99
Cisco WS-C3850-48P-L 48-Port Gigabit 3850 PoE Switch w/ 715W+ C3850-NM-4-1G Mod
$83.00
Cisco QSFP-40G-SR-BD BiDi Short-reach Transceiver, 1 Year Warranty
$17.25
Cisco C3850-NM-2-10G 2 Port Network Exp.Module for 3850
$38.99
Genuine Cisco SFP-10G-SR V03 10GBASE-SR SFP+ Transceiver Module 10-2415-03
$8.00
Cisco WS-C3850-48F-S Catalyst 3850 48x 1GB PoE+ RJ-45 1x Module Switch
$185.00
Cisco Catalyst C9200-48P-A 48 Port Rack Mountable Network Switch
$1000.00
|
||
No Discussions have been posted on this vulnerability. |