Vulnerability   
Search   
    Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.871322
Category:Red Hat Local Security Checks
Title:RedHat Update for GNOME Shell RHSA-2015:0535-01
Summary:The remote host is missing an update for the 'GNOME Shell'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'GNOME Shell'
package(s) announced via the referenced advisory.

Vulnerability Insight:
GNOME Shell and the packages it depends upon provide the core user
interface of the Red Hat Enterprise Linux desktop, including functions such
as navigating between windows and launching applications.

It was found that the GNOME shell did not disable the Print Screen key when
the screen was locked. This could allow an attacker with physical access to
a system with a locked screen to crash the screen-locking application by
creating a large amount of screenshots. (CVE-2014-7300)

This update also fixes the following bugs:

* The Timed Login feature, which automatically logs in a specified user
after a specified period of time, stopped working after the first user of
the GUI logged out. This has been fixed, and the specified user is always
logged in if no one else logs in. (BZ#1043571)

* If two monitors were arranged vertically with the secondary monitor above
the primary monitor, it was impossible to move windows onto the secondary
monitor. With this update, windows can be moved through the upper edge of
the first monitor to the secondary monitor. (BZ#1075240)

* If the Gnome Display Manager (GDM) user list was disabled and a user
entered the user name, the password prompt did not appear. Instead, the
user had to enter the user name one more time. The GDM code that contained
this error has been fixed, and users can enter their user names and
passwords as expected. (BZ#1109530)

* Prior to this update, only a small area was available on the GDM login
screen for a custom text banner. As a consequence, when a long banner was
used, it did not fit into the area, and the person reading the banner had
to use scrollbars to view the whole text. With this update, more space is
used for the banner if necessary, which allows the user to read the message
conveniently. (BZ#1110036)

* When the Cancel button was pressed while an LDAP user name and password
was being validated, the GDM code did not handle the situation correctly.
As a consequence, GDM became unresponsive, and it was impossible to return
to the login screen. The affected code has been fixed, and LDAP user
validation can be canceled, allowing another user to log in instead.
(BZ#1137041)

* If the window focus mode in GNOME was set to 'mouse' or 'sloppy',
navigating through areas of a pop-up menu displayed outside its parent
window caused the window to lose its focus. Consequently, the menu was not
usable. This has been fixed, and the window focus is kept in under this
scenario. (BZ#1149585)

* If user authentication is configured to require a smart card to log in,
user names are obtained from the smart card. The a ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
GNOME Shell on Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-7300
http://openwall.com/lists/oss-security/2014/09/29/17
RedHat Security Advisories: RHSA-2015:0535
http://rhn.redhat.com/errata/RHSA-2015-0535.html
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.