New gdm packages fix local root exploit CVE-2006-1057. Upgrade to gdm 2.6.0.8-1sarge2
Reporter | Title | Published | Views | Family All 22 |
---|---|---|---|---|
UbuntuCve | CVE-2006-1057 | 25 Apr 200600:00 | – | ubuntucve |
Cent OS | gdm security update | 4 May 200722:41 | – | centos |
Tenable Nessus | Mandrake Linux Security Advisory : gdm (MDKSA-2006:083) | 13 May 200600:00 | – | nessus |
Tenable Nessus | Oracle Linux 4 : gdm (ELSA-2007-0286) | 12 Jul 201300:00 | – | nessus |
Tenable Nessus | Debian DSA-1040-1 : gdm - programming error | 14 Oct 200600:00 | – | nessus |
Tenable Nessus | RHEL 4 : gdm (RHSA-2007:0286) | 2 May 200700:00 | – | nessus |
Tenable Nessus | Ubuntu 5.04 / 5.10 : gdm vulnerabilitiy (USN-278-1) | 13 May 200600:00 | – | nessus |
Tenable Nessus | Scientific Linux Security Update : gdm on SL4 i386/x86_64 | 1 Aug 201200:00 | – | nessus |
Tenable Nessus | Fedora Core 5 : gdm-2.14.1-1.fc5.2 (2006-338) | 21 Apr 200600:00 | – | nessus |
Veracode | Privilege Escalation | 10 Apr 202000:17 | – | veracode |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3.1 | all | gdm | 2.6.0.8-1sarge2 | gdm_2.6.0.8-1sarge2_all.deb |
Debian | 3.1 | i386 | gdm | 2.6.0.8-1sarge2 | gdm_2.6.0.8-1sarge2_i386.deb |
Debian | 3.1 | ia64 | gdm | 2.6.0.8-1sarge2 | gdm_2.6.0.8-1sarge2_ia64.deb |
Debian | 3.1 | powerpc | gdm | 2.6.0.8-1sarge2 | gdm_2.6.0.8-1sarge2_powerpc.deb |
Debian | 3.1 | m68k | gdm | 2.6.0.8-1sarge2 | gdm_2.6.0.8-1sarge2_m68k.deb |
Debian | 3.1 | s390 | gdm | 2.6.0.8-1sarge2 | gdm_2.6.0.8-1sarge2_s390.deb |
Debian | 3.1 | arm | gdm | 2.6.0.8-1sarge2 | gdm_2.6.0.8-1sarge2_arm.deb |
Debian | 3.1 | alpha | gdm | 2.6.0.8-1sarge2 | gdm_2.6.0.8-1sarge2_alpha.deb |
Debian | 3.1 | sparc | gdm | 2.6.0.8-1sarge2 | gdm_2.6.0.8-1sarge2_sparc.deb |
Debian | 3.1 | hppa | gdm | 2.6.0.8-1sarge2 | gdm_2.6.0.8-1sarge2_hppa.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo