Rapid7 Vulnerability & Exploit Database

Rocky Linux: CVE-2021-21779: GNOME (RLSA-2021-4381)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Rocky Linux: CVE-2021-21779: GNOME (RLSA-2021-4381)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
07/08/2021
Created
05/06/2022
Added
05/05/2022
Modified
08/28/2024

Description

A use-after-free vulnerability exists in the way Webkit’s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.

Solution(s)

  • rocky-upgrade-LibRaw
  • rocky-upgrade-LibRaw-debuginfo
  • rocky-upgrade-LibRaw-debugsource
  • rocky-upgrade-LibRaw-devel
  • rocky-upgrade-accountsservice
  • rocky-upgrade-accountsservice-debuginfo
  • rocky-upgrade-accountsservice-debugsource
  • rocky-upgrade-accountsservice-devel
  • rocky-upgrade-accountsservice-libs
  • rocky-upgrade-accountsservice-libs-debuginfo
  • rocky-upgrade-gdm
  • rocky-upgrade-gdm-debuginfo
  • rocky-upgrade-gdm-debugsource
  • rocky-upgrade-gnome-autoar
  • rocky-upgrade-gnome-autoar-debuginfo
  • rocky-upgrade-gnome-autoar-debugsource
  • rocky-upgrade-gnome-calculator
  • rocky-upgrade-gnome-calculator-debuginfo
  • rocky-upgrade-gnome-calculator-debugsource
  • rocky-upgrade-gnome-control-center
  • rocky-upgrade-gnome-control-center-debuginfo
  • rocky-upgrade-gnome-control-center-debugsource
  • rocky-upgrade-gnome-online-accounts
  • rocky-upgrade-gnome-online-accounts-debuginfo
  • rocky-upgrade-gnome-online-accounts-debugsource
  • rocky-upgrade-gnome-online-accounts-devel
  • rocky-upgrade-gnome-session
  • rocky-upgrade-gnome-session-debuginfo
  • rocky-upgrade-gnome-session-debugsource
  • rocky-upgrade-gnome-session-kiosk-session
  • rocky-upgrade-gnome-session-wayland-session
  • rocky-upgrade-gnome-session-xsession
  • rocky-upgrade-gnome-settings-daemon
  • rocky-upgrade-gnome-settings-daemon-debuginfo
  • rocky-upgrade-gnome-settings-daemon-debugsource
  • rocky-upgrade-gnome-shell
  • rocky-upgrade-gnome-shell-debuginfo
  • rocky-upgrade-gnome-shell-debugsource
  • rocky-upgrade-gnome-software
  • rocky-upgrade-gnome-software-debuginfo
  • rocky-upgrade-gnome-software-debugsource
  • rocky-upgrade-gnome-software-devel
  • rocky-upgrade-gsettings-desktop-schemas
  • rocky-upgrade-gsettings-desktop-schemas-devel
  • rocky-upgrade-gtk-update-icon-cache
  • rocky-upgrade-gtk-update-icon-cache-debuginfo
  • rocky-upgrade-gtk3
  • rocky-upgrade-gtk3-debuginfo
  • rocky-upgrade-gtk3-debugsource
  • rocky-upgrade-gtk3-devel
  • rocky-upgrade-gtk3-devel-debuginfo
  • rocky-upgrade-gtk3-immodule-xim
  • rocky-upgrade-gtk3-immodule-xim-debuginfo
  • rocky-upgrade-mutter
  • rocky-upgrade-mutter-debuginfo
  • rocky-upgrade-mutter-debugsource
  • rocky-upgrade-mutter-devel
  • rocky-upgrade-vino
  • rocky-upgrade-vino-debuginfo
  • rocky-upgrade-vino-debugsource
  • rocky-upgrade-webkit2gtk3
  • rocky-upgrade-webkit2gtk3-debuginfo
  • rocky-upgrade-webkit2gtk3-debugsource
  • rocky-upgrade-webkit2gtk3-devel
  • rocky-upgrade-webkit2gtk3-devel-debuginfo
  • rocky-upgrade-webkit2gtk3-jsc
  • rocky-upgrade-webkit2gtk3-jsc-debuginfo
  • rocky-upgrade-webkit2gtk3-jsc-devel
  • rocky-upgrade-webkit2gtk3-jsc-devel-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;