Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 5 2006-338: gdm

Vulnerability Assessment Details

Fedora Core 5 2006-338: gdm

Vulnerability Assessment Summary
Check for the version of the gdm package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2006-338 (gdm).

Gdm (the GNOME Display Manager) is a highly configurable
reimplementation of xdm, the X Display Manager. Gdm permits you to log
into your system with the X Window System running and supports running
several different X sessions on your local machine at the same time.

Update Information:

(Notes taken from upstream release mail)

- The sockets connection between the slaves and the GDM
daemon is now
better managed to better ensure that sockets are never left
(Brian Cameron)

- Corrected bug that causes a core dump when you click on
fields that have an id. (Brian Cameron)

- Add new GdmXserverTimeout configuration setting so that
the length of
time GDM waits for the Xserver to start can be tuned, so
GDM better
works with Xservers that require more than 10 seconds to start.

- The happygnome and happygnome-list gdmgreeter themes now
use the
official logo. (Brian Cameron)

- Now GDM configure supports --with-sysconfsubdir so that GDM's
configuration directory can be configured to not have
'/gdm' appended
to the end.

- Fix for ensuring .ICEauthority file has proper
Addresses CVE-2006-1057. (Hans Petter Jansson)

- Fix 'Show Actions Menu' section in gdmsetup so it appears
when both
'Plain' and 'Themed' style is chosen. (Brian Cameron, Dennis

- Now use LINGUAS procedure for defining languages.
(Michiel Sikkes)

- Now Xsession script uses '$@' instead of '$1' so it is
possible to
pass arguments with the command to run. (Brian Cameron)

- Add Trusted Solraris support. (Niall Power)

- One line fix to Solaris auditing logic that fixes a bug
authentication to fail when auditing is turned on. (Brian

- Fixes to compile with C99 and fixes to compile under NetBSD.
Remove EXPANDED_* variables from the configure. (Julio M.

- Translation updates (├┬Żygimantas Beru├┬ka,
Dejean, Laurent Dhima, Maxim Dziumanenko, Alessio
Frusciante, Rhys
Jones, Raphael Higino, Theppitak Karoonboonyanan, Gabor Kelmen,
Priit Laes, Jordi Mallach, Kjartan Maraas, Daniel Nylander,
Papdimas, Guilherme de S. Pastore, Ankit Patel, Ignacio Casal
Quinteiro, Hendrik Richter, Jens Seidel, Francisco Javier
F. Serrador,
Alexander Shopov, Clytie Siddall, Ilkka Tuohela, Vincent
van Adrighem,
Tommi Vainikaninen)

Solution : Get the newest Fedora Updates
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Samsung 32GB USB 3.0 Flash Drive Duo (MUF-32CB/AM)
Samsung 32GB USB 3.0 Flash Drive Duo (MUF-32CB/AM) pictureSamsung 850 EVO 120GB Internal 2.5" SSD mz7ln120 / MZ-75E120
Samsung 850 EVO 120GB Internal 2.5Samsung s22e310h 21.5inch 19020x1080 LED Backlit VGA/HDMI computer monitor 
Samsung s22e310h 21.5inch 19020x1080 LED Backlit VGA/HDMI computer monitor  pictureSamsung Galaxy Tab 4 (8-Inch, Black)
Samsung Galaxy Tab 4 (8-Inch, Black) picture


No Discussions have been posted on this vulnerability.