vulnerability
Rocky Linux: CVE-2020-9850: GNOME (RLSA-2020-4451)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Jun 9, 2020 | Mar 12, 2024 | Mar 31, 2026 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Jun 9, 2020
Added
Mar 12, 2024
Modified
Mar 31, 2026
Description
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. A remote attacker may be able to cause arbitrary code execution.
Solutions
rocky-upgrade-dleyna-rendererrocky-upgrade-dleyna-renderer-debuginforocky-upgrade-dleyna-renderer-debugsourcerocky-upgrade-frei0r-develrocky-upgrade-frei0r-pluginsrocky-upgrade-frei0r-plugins-debuginforocky-upgrade-frei0r-plugins-debugsourcerocky-upgrade-frei0r-plugins-opencvrocky-upgrade-frei0r-plugins-opencv-debuginforocky-upgrade-gnome-remote-desktoprocky-upgrade-gnome-remote-desktop-debuginforocky-upgrade-gnome-remote-desktop-debugsourcerocky-upgrade-gnome-sessionrocky-upgrade-gnome-session-debuginforocky-upgrade-gnome-session-debugsourcerocky-upgrade-gnome-session-wayland-sessionrocky-upgrade-gnome-session-xsessionrocky-upgrade-gsettings-desktop-schemasrocky-upgrade-gsettings-desktop-schemas-develrocky-upgrade-gtk-update-icon-cacherocky-upgrade-gtk-update-icon-cache-debuginforocky-upgrade-gtk3rocky-upgrade-gtk3-debuginforocky-upgrade-gtk3-debugsourcerocky-upgrade-gtk3-develrocky-upgrade-gtk3-devel-debuginforocky-upgrade-gtk3-immodule-ximrocky-upgrade-gtk3-immodule-xim-debuginforocky-upgrade-librawrocky-upgrade-libraw-debuginforocky-upgrade-libraw-debugsourcerocky-upgrade-libraw-develrocky-upgrade-libsouprocky-upgrade-libsoup-debuginforocky-upgrade-libsoup-debugsourcerocky-upgrade-libsoup-develrocky-upgrade-packagekitrocky-upgrade-packagekit-command-not-foundrocky-upgrade-packagekit-command-not-found-debuginforocky-upgrade-packagekit-cronrocky-upgrade-packagekit-debuginforocky-upgrade-packagekit-debugsourcerocky-upgrade-packagekit-glibrocky-upgrade-packagekit-glib-debuginforocky-upgrade-packagekit-glib-develrocky-upgrade-packagekit-gstreamer-pluginrocky-upgrade-packagekit-gstreamer-plugin-debuginforocky-upgrade-packagekit-gtk3-modulerocky-upgrade-packagekit-gtk3-module-debuginforocky-upgrade-pipewirerocky-upgrade-pipewire-debuginforocky-upgrade-pipewire-debugsourcerocky-upgrade-pipewire-develrocky-upgrade-pipewire-docrocky-upgrade-pipewire-libsrocky-upgrade-pipewire-libs-debuginforocky-upgrade-pipewire-utilsrocky-upgrade-pipewire-utils-debuginforocky-upgrade-pipewire0.2-debugsourcerocky-upgrade-pipewire0.2-develrocky-upgrade-pipewire0.2-libsrocky-upgrade-pipewire0.2-libs-debuginforocky-upgrade-potracerocky-upgrade-potrace-debuginforocky-upgrade-potrace-debugsourcerocky-upgrade-pygobject3-debuginforocky-upgrade-pygobject3-debugsourcerocky-upgrade-pygobject3-develrocky-upgrade-python3-gobjectrocky-upgrade-python3-gobject-baserocky-upgrade-python3-gobject-base-debuginforocky-upgrade-python3-gobject-debuginforocky-upgrade-trackerrocky-upgrade-tracker-debuginforocky-upgrade-tracker-debugsourcerocky-upgrade-tracker-develrocky-upgrade-vte-profilerocky-upgrade-vte291rocky-upgrade-vte291-debuginforocky-upgrade-vte291-debugsourcerocky-upgrade-vte291-develrocky-upgrade-vte291-devel-debuginforocky-upgrade-webrtc-audio-processingrocky-upgrade-webrtc-audio-processing-debuginforocky-upgrade-webrtc-audio-processing-debugsourcerocky-upgrade-xdg-desktop-portal-gtkrocky-upgrade-xdg-desktop-portal-gtk-debuginforocky-upgrade-xdg-desktop-portal-gtk-debugsource
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.