Rapid7 Vulnerability & Exploit Database

Alma Linux: CVE-2020-14391: Moderate: GNOME security, bug fix, and enhancement update (ALSA-2020-4451)

Back to Search

Alma Linux: CVE-2020-14391: Moderate: GNOME security, bug fix, and enhancement update (ALSA-2020-4451)

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
02/08/2021
Created
05/05/2022
Added
05/04/2022
Modified
05/13/2022

Description

A flaw was found in the GNOME Control Center in Red Hat Enterprise Linux 8 versions prior to 8.2, where it improperly uses Red Hat Customer Portal credentials when a user registers a system through the GNOME Settings User Interface. This flaw allows a local attacker to discover the Red Hat Customer Portal password. The highest threat from this vulnerability is to confidentiality.

Solution(s)

  • alma-upgrade-LibRaw-devel
  • alma-upgrade-PackageKit
  • alma-upgrade-PackageKit-command-not-found
  • alma-upgrade-PackageKit-cron
  • alma-upgrade-PackageKit-glib
  • alma-upgrade-PackageKit-glib-devel
  • alma-upgrade-PackageKit-gstreamer-plugin
  • alma-upgrade-PackageKit-gtk3-module
  • alma-upgrade-dleyna-renderer
  • alma-upgrade-frei0r-devel
  • alma-upgrade-frei0r-plugins
  • alma-upgrade-frei0r-plugins-opencv
  • alma-upgrade-gnome-remote-desktop
  • alma-upgrade-gtk-doc
  • alma-upgrade-gvfs
  • alma-upgrade-libsoup
  • alma-upgrade-libsoup-devel
  • alma-upgrade-mutter-devel
  • alma-upgrade-nautilus
  • alma-upgrade-nautilus-devel
  • alma-upgrade-pipewire
  • alma-upgrade-pipewire-devel
  • alma-upgrade-pipewire-doc
  • alma-upgrade-pipewire-libs
  • alma-upgrade-pipewire-utils
  • alma-upgrade-pipewire0.2-devel
  • alma-upgrade-pipewire0.2-libs
  • alma-upgrade-potrace
  • alma-upgrade-pygobject3-devel
  • alma-upgrade-python3-gobject
  • alma-upgrade-python3-gobject-base
  • alma-upgrade-tracker
  • alma-upgrade-tracker-devel
  • alma-upgrade-vte-profile
  • alma-upgrade-vte291
  • alma-upgrade-vte291-devel
  • alma-upgrade-webrtc-audio-processing
  • alma-upgrade-xdg-desktop-portal-gtk

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;