![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.122443 |
Category: | Oracle Linux Local Security Checks |
Title: | Oracle: Security Advisory (ELSA-2009-1364) |
Summary: | The remote host is missing an update for the 'gdm' package(s) announced via the ELSA-2009-1364 advisory. |
Description: | Summary: The remote host is missing an update for the 'gdm' package(s) announced via the ELSA-2009-1364 advisory. Vulnerability Insight: [1:2.16.0-56] - Resolves: #239818 181302 - Fix tcp wrappers detection on 64-bit [1:2.16.0-55] Resolves: #196054 - Fix docs subpackage Requires [1:2.16.0-53] Resolves: #196054 - Add docs subpackage [1:2.16.0-52] Resolves: #226931 - Add te_IN translations [1:2.16.0-51] Resolves: #441971 - Make ctrl-alt-backspace at the login screen more robust [1:2.16.0-50] Resolves: #458331 - Add GDM to audio group by default. [1:2.16.0-49] Resolves: #474588 - Don't crash if defined extended input device is unplugged Patch by Olivier Fourdan. [1:2.16.0-48] Resolves: #239818 - Rebuild with tcp_wrappers build requires [1:2.16.0-47] Resolves: #473262 - Fix pointer on tablet devices. Affected Software/OS: 'gdm' package(s) on Oracle Linux 5. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-2697 BugTraq ID: 36219 http://www.securityfocus.com/bid/36219 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9586 RedHat Security Advisories: RHSA-2009:1364 https://rhn.redhat.com/errata/RHSA-2009-1364.html http://secunia.com/advisories/36553 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |