![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.59376 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 5 FEDORA-2006-975 (gdb) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to gdb announced via advisory FEDORA-2006-975. GDB, the GNU debugger, allows you to debug programs written in C, C++, Java, and other languages, by executing them in a controlled fashion and printing their data. Update Information: This is a security update for CVE-2006-4146. In addition other bugfixes are listed below. * Mon Sep 4 2006 Alexandre Oliva - 6.3.0.0-1.134 - Fix bug in patch for CVE-2006-4146. (BZ 203881) * Wed Aug 23 2006 Alexandre Oliva - 6.3.0.0-1.133 - BuildReq flex, bison, sharutils, prelink and, on multilib systems, 32-bit glibc-devel. - Add slash between dir and file names in edit command (BZ 192261, BZ 199156). - Avoid overflows and underflows in dwarf expression computation stack. * Thu Jun 15 2006 Alexandre Oliva - 6.3.0.0-1.132 - Additional patch for BZ 175083, to cope with waitpid setting status even when returning zero. * Wed May 31 2006 Alexandre Oliva - 6.3.0.0-1.131 - Require gettext at build time. (BZ193366) * Sat May 27 2006 Alexandre Oliva - 6.3.0.0-1.130 - Rewrite patch for BZ 175270, BZ 175083 so as to catch the exception earlier. - Remove too-fragile testcases from patches for CFA value and S augmentation. * Wed May 17 2006 Alexandre Oliva - 6.3.0.0-1.129 - Add not-automatically-generated file to fopen64 patch (BZ 191948). * Fri Apr 14 2006 Alexandre Oliva - 6.3.0.0-1.128 - Avoid race conditions caused by exceptions messing with signal masks. (BZ 175270, BZ 175083, maybe BZ 172938). - Hardcode /bin and /usr/bin paths into gstack (BZ 179829, BZ 190548). - Build in a subdir of the source tree instead of in a sibling directory. - Switch to versioning scheme that uses the same base revision number for all OSes, and uses a suffix to tell the builds apart and ensure upgradability. * Thu Apr 13 2006 Stepan Kasal - 6.3.0.0-1.127 - Bump up release number. * Thu Apr 13 2006 Stepan Kasal - 6.3.0.0-1.123 - Use fopen64 where available. Fixes BZ 178796, BZ 190547. - Use bigger numbers than int. Fixes BZ 171783, BZ 179096. Solution: Apply the appropriate updates. This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/ This update can be installed with the 'yum' update program. Use 'yum update package-name' at the command line. For more information, refer to 'Managing Software with yum,' available at http://fedora.redhat.com/docs/yum/. https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2006-975 Risk factor : High CVSS Score: 5.1 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2006-4146 http://lists.apple.com/archives/security-announce/2006/Oct/msg00000.html BugTraq ID: 19802 http://www.securityfocus.com/bid/19802 http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html http://security.gentoo.org/glsa/glsa-200711-23.xml http://www.osvdb.org/28318 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10463 http://www.redhat.com/support/errata/RHSA-2007-0229.html http://www.redhat.com/support/errata/RHSA-2007-0469.html http://securitytracker.com/id?1017138 http://secunia.com/advisories/21713 http://secunia.com/advisories/22205 http://secunia.com/advisories/22662 http://secunia.com/advisories/25098 http://secunia.com/advisories/25632 http://secunia.com/advisories/25894 http://secunia.com/advisories/25934 http://secunia.com/advisories/26909 http://secunia.com/advisories/27706 SGI Security Advisory: 20070602-01-P ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc http://www.ubuntu.com/usn/usn-356-1 http://www.vupen.com/english/advisories/2006/3433 http://www.vupen.com/english/advisories/2006/4283 http://www.vupen.com/english/advisories/2007/3229 |
Copyright | Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |