vulnerability
Rocky Linux: CVE-2020-9952: GNOME (RLSA-2020-4451)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:N/C:N/I:P/A:P) | Oct 16, 2020 | Mar 12, 2024 | Mar 31, 2026 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:P)
Published
Oct 16, 2020
Added
Mar 12, 2024
Modified
Mar 31, 2026
Description
An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.
Solutions
rocky-upgrade-dleyna-rendererrocky-upgrade-dleyna-renderer-debuginforocky-upgrade-dleyna-renderer-debugsourcerocky-upgrade-frei0r-develrocky-upgrade-frei0r-pluginsrocky-upgrade-frei0r-plugins-debuginforocky-upgrade-frei0r-plugins-debugsourcerocky-upgrade-frei0r-plugins-opencvrocky-upgrade-frei0r-plugins-opencv-debuginforocky-upgrade-gnome-remote-desktoprocky-upgrade-gnome-remote-desktop-debuginforocky-upgrade-gnome-remote-desktop-debugsourcerocky-upgrade-gnome-sessionrocky-upgrade-gnome-session-debuginforocky-upgrade-gnome-session-debugsourcerocky-upgrade-gnome-session-wayland-sessionrocky-upgrade-gnome-session-xsessionrocky-upgrade-gsettings-desktop-schemasrocky-upgrade-gsettings-desktop-schemas-develrocky-upgrade-gtk-update-icon-cacherocky-upgrade-gtk-update-icon-cache-debuginforocky-upgrade-gtk3rocky-upgrade-gtk3-debuginforocky-upgrade-gtk3-debugsourcerocky-upgrade-gtk3-develrocky-upgrade-gtk3-devel-debuginforocky-upgrade-gtk3-immodule-ximrocky-upgrade-gtk3-immodule-xim-debuginforocky-upgrade-librawrocky-upgrade-libraw-debuginforocky-upgrade-libraw-debugsourcerocky-upgrade-libraw-develrocky-upgrade-libsouprocky-upgrade-libsoup-debuginforocky-upgrade-libsoup-debugsourcerocky-upgrade-libsoup-develrocky-upgrade-packagekitrocky-upgrade-packagekit-command-not-foundrocky-upgrade-packagekit-command-not-found-debuginforocky-upgrade-packagekit-cronrocky-upgrade-packagekit-debuginforocky-upgrade-packagekit-debugsourcerocky-upgrade-packagekit-glibrocky-upgrade-packagekit-glib-debuginforocky-upgrade-packagekit-glib-develrocky-upgrade-packagekit-gstreamer-pluginrocky-upgrade-packagekit-gstreamer-plugin-debuginforocky-upgrade-packagekit-gtk3-modulerocky-upgrade-packagekit-gtk3-module-debuginforocky-upgrade-pipewirerocky-upgrade-pipewire-debuginforocky-upgrade-pipewire-debugsourcerocky-upgrade-pipewire-develrocky-upgrade-pipewire-docrocky-upgrade-pipewire-libsrocky-upgrade-pipewire-libs-debuginforocky-upgrade-pipewire-utilsrocky-upgrade-pipewire-utils-debuginforocky-upgrade-pipewire0.2-debugsourcerocky-upgrade-pipewire0.2-develrocky-upgrade-pipewire0.2-libsrocky-upgrade-pipewire0.2-libs-debuginforocky-upgrade-potracerocky-upgrade-potrace-debuginforocky-upgrade-potrace-debugsourcerocky-upgrade-pygobject3-debuginforocky-upgrade-pygobject3-debugsourcerocky-upgrade-pygobject3-develrocky-upgrade-python3-gobjectrocky-upgrade-python3-gobject-baserocky-upgrade-python3-gobject-base-debuginforocky-upgrade-python3-gobject-debuginforocky-upgrade-trackerrocky-upgrade-tracker-debuginforocky-upgrade-tracker-debugsourcerocky-upgrade-tracker-develrocky-upgrade-vte-profilerocky-upgrade-vte291rocky-upgrade-vte291-debuginforocky-upgrade-vte291-debugsourcerocky-upgrade-vte291-develrocky-upgrade-vte291-devel-debuginforocky-upgrade-webrtc-audio-processingrocky-upgrade-webrtc-audio-processing-debuginforocky-upgrade-webrtc-audio-processing-debugsourcerocky-upgrade-xdg-desktop-portal-gtkrocky-upgrade-xdg-desktop-portal-gtk-debuginforocky-upgrade-xdg-desktop-portal-gtk-debugsource
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.