Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59376
Category:Fedora Local Security Checks
Title:Fedora Core 5 FEDORA-2006-975 (gdb)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to gdb
announced via advisory FEDORA-2006-975.

GDB, the GNU debugger, allows you to debug programs written in C, C++,
Java, and other languages, by executing them in a controlled fashion
and printing their data.

Update Information:

This is a security update for CVE-2006-4146.
In addition other bugfixes are listed below.

* Mon Sep 4 2006 Alexandre Oliva - 6.3.0.0-1.134
- Fix bug in patch for CVE-2006-4146. (BZ 203881)
* Wed Aug 23 2006 Alexandre Oliva - 6.3.0.0-1.133
- BuildReq flex, bison, sharutils, prelink and, on multilib systems,
32-bit glibc-devel.
- Add slash between dir and file names in edit command (BZ 192261,
BZ 199156).
- Avoid overflows and underflows in dwarf expression computation stack.
* Thu Jun 15 2006 Alexandre Oliva - 6.3.0.0-1.132
- Additional patch for BZ 175083, to cope with waitpid setting status
even when returning zero.
* Wed May 31 2006 Alexandre Oliva - 6.3.0.0-1.131
- Require gettext at build time. (BZ193366)
* Sat May 27 2006 Alexandre Oliva - 6.3.0.0-1.130
- Rewrite patch for BZ 175270, BZ 175083 so as to catch the exception
earlier.
- Remove too-fragile testcases from patches for CFA value and S
augmentation.
* Wed May 17 2006 Alexandre Oliva - 6.3.0.0-1.129
- Add not-automatically-generated file to fopen64 patch (BZ 191948).
* Fri Apr 14 2006 Alexandre Oliva - 6.3.0.0-1.128
- Avoid race conditions caused by exceptions messing with signal masks.
(BZ 175270, BZ 175083, maybe BZ 172938).
- Hardcode /bin and /usr/bin paths into gstack (BZ 179829, BZ 190548).
- Build in a subdir of the source tree instead of in a sibling directory.
- Switch to versioning scheme that uses the same base revision number
for all OSes, and uses a suffix to tell the builds apart and ensure
upgradability.
* Thu Apr 13 2006 Stepan Kasal - 6.3.0.0-1.127
- Bump up release number.
* Thu Apr 13 2006 Stepan Kasal - 6.3.0.0-1.123
- Use fopen64 where available. Fixes BZ 178796, BZ 190547.
- Use bigger numbers than int. Fixes BZ 171783, BZ 179096.

Solution: Apply the appropriate updates.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/


This update can be installed with the 'yum' update program. Use 'yum update
package-name' at the command line. For more information, refer to 'Managing
Software with yum,' available at http://fedora.redhat.com/docs/yum/.


https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2006-975

Risk factor : High

CVSS Score:
5.1

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-4146
http://lists.apple.com/archives/security-announce/2006/Oct/msg00000.html
BugTraq ID: 19802
http://www.securityfocus.com/bid/19802
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
http://security.gentoo.org/glsa/glsa-200711-23.xml
http://www.osvdb.org/28318
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10463
http://www.redhat.com/support/errata/RHSA-2007-0229.html
http://www.redhat.com/support/errata/RHSA-2007-0469.html
http://securitytracker.com/id?1017138
http://secunia.com/advisories/21713
http://secunia.com/advisories/22205
http://secunia.com/advisories/22662
http://secunia.com/advisories/25098
http://secunia.com/advisories/25632
http://secunia.com/advisories/25894
http://secunia.com/advisories/25934
http://secunia.com/advisories/26909
http://secunia.com/advisories/27706
SGI Security Advisory: 20070602-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
http://www.ubuntu.com/usn/usn-356-1
http://www.vupen.com/english/advisories/2006/3433
http://www.vupen.com/english/advisories/2006/4283
http://www.vupen.com/english/advisories/2007/3229
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.