Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 5 2006-338: gdm


Vulnerability Assessment Details

Fedora Core 5 2006-338: gdm

Vulnerability Assessment Summary
Check for the version of the gdm package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2006-338 (gdm).

Gdm (the GNOME Display Manager) is a highly configurable
reimplementation of xdm, the X Display Manager. Gdm permits you to log
into your system with the X Window System running and supports running
several different X sessions on your local machine at the same time.

Update Information:

(Notes taken from upstream release mail)

- The sockets connection between the slaves and the GDM
daemon is now
better managed to better ensure that sockets are never left
open.
(Brian Cameron)

- Corrected bug that causes a core dump when you click on
gdmgreeter
fields that have an id. (Brian Cameron)

- Add new GdmXserverTimeout configuration setting so that
the length of
time GDM waits for the Xserver to start can be tuned, so
GDM better
works with Xservers that require more than 10 seconds to start.
(Emilie)

- The happygnome and happygnome-list gdmgreeter themes now
use the
official logo. (Brian Cameron)

- Now GDM configure supports --with-sysconfsubdir so that GDM's
configuration directory can be configured to not have
'/gdm' appended
to the end.

- Fix for ensuring .ICEauthority file has proper
ownership/permissions.
Addresses CVE-2006-1057. (Hans Petter Jansson)

- Fix 'Show Actions Menu' section in gdmsetup so it appears
when both
'Plain' and 'Themed' style is chosen. (Brian Cameron, Dennis
Cranston)

- Now use LINGUAS procedure for defining languages.
(Michiel Sikkes)

- Now Xsession script uses '$@' instead of '$1' so it is
possible to
pass arguments with the command to run. (Brian Cameron)

- Add Trusted Solraris support. (Niall Power)

- One line fix to Solaris auditing logic that fixes a bug
causing
authentication to fail when auditing is turned on. (Brian
Cameron)

- Fixes to compile with C99 and fixes to compile under NetBSD.
Remove EXPANDED_* variables from the configure. (Julio M.
Merino
Vidal)

- Translation updates (├┬Żygimantas Beru├┬ka,
Beno├┬«t
Dejean, Laurent Dhima, Maxim Dziumanenko, Alessio
Frusciante, Rhys
Jones, Raphael Higino, Theppitak Karoonboonyanan, Gabor Kelmen,
Priit Laes, Jordi Mallach, Kjartan Maraas, Daniel Nylander,
Kostas
Papdimas, Guilherme de S. Pastore, Ankit Patel, Ignacio Casal
Quinteiro, Hendrik Richter, Jens Seidel, Francisco Javier
F. Serrador,
Alexander Shopov, Clytie Siddall, Ilkka Tuohela, Vincent
van Adrighem,
Tommi Vainikaninen)


Solution : Get the newest Fedora Updates
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Intel Xeon X3230 SLACS 2.66GHZ LGA775 Quad Core CPU Processor
$22.0
Intel Xeon X3230 SLACS 2.66GHZ LGA775 Quad Core CPU Processor pictureDell PowerEdge R610 2x X5650 2.66GHz 6 Core 16GB 6x 256GB SATA SSD PERC 6/i
$1100.0
Dell PowerEdge R610 2x X5650 2.66GHz 6 Core 16GB 6x 256GB SATA SSD PERC 6/i pictureDell PowerEdge R610 2x X5650 2.66GHz 6 Core 32GB 6x 512GB SATA SSD PERC 6/i
$1500.0
Dell PowerEdge R610 2x X5650 2.66GHz 6 Core 32GB 6x 512GB SATA SSD PERC 6/i pictureDell PowerEdge R610 2x X5660 2.8GHz 6 Core 16GB 6x 600GB 10K SAS PERC 6/i
$1490.0
Dell PowerEdge R610 2x X5660 2.8GHz 6 Core 16GB 6x 600GB 10K SAS PERC 6/i picture


Discussions

No Discussions have been posted on this vulnerability.