vulnerability
Rocky Linux: CVE-2021-30720: GNOME (RLSA-2021-4381)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | 2021-09-08 | 2022-05-05 | 2024-11-20 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
2021-09-08
Added
2022-05-05
Modified
2024-11-20
Description
A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers.
Solution(s)
rocky-upgrade-accountsservicerocky-upgrade-accountsservice-debuginforocky-upgrade-accountsservice-debugsourcerocky-upgrade-accountsservice-develrocky-upgrade-accountsservice-libsrocky-upgrade-accountsservice-libs-debuginforocky-upgrade-gdmrocky-upgrade-gdm-debuginforocky-upgrade-gdm-debugsourcerocky-upgrade-gnome-autoarrocky-upgrade-gnome-autoar-debuginforocky-upgrade-gnome-autoar-debugsourcerocky-upgrade-gnome-calculatorrocky-upgrade-gnome-calculator-debuginforocky-upgrade-gnome-calculator-debugsourcerocky-upgrade-gnome-control-centerrocky-upgrade-gnome-control-center-debuginforocky-upgrade-gnome-control-center-debugsourcerocky-upgrade-gnome-online-accountsrocky-upgrade-gnome-online-accounts-debuginforocky-upgrade-gnome-online-accounts-debugsourcerocky-upgrade-gnome-online-accounts-develrocky-upgrade-gnome-sessionrocky-upgrade-gnome-session-debuginforocky-upgrade-gnome-session-debugsourcerocky-upgrade-gnome-session-kiosk-sessionrocky-upgrade-gnome-session-wayland-sessionrocky-upgrade-gnome-session-xsessionrocky-upgrade-gnome-settings-daemonrocky-upgrade-gnome-settings-daemon-debuginforocky-upgrade-gnome-settings-daemon-debugsourcerocky-upgrade-gnome-shellrocky-upgrade-gnome-shell-debuginforocky-upgrade-gnome-shell-debugsourcerocky-upgrade-gnome-softwarerocky-upgrade-gnome-software-debuginforocky-upgrade-gnome-software-debugsourcerocky-upgrade-gnome-software-develrocky-upgrade-gsettings-desktop-schemasrocky-upgrade-gsettings-desktop-schemas-develrocky-upgrade-gtk-update-icon-cacherocky-upgrade-gtk-update-icon-cache-debuginforocky-upgrade-gtk3rocky-upgrade-gtk3-debuginforocky-upgrade-gtk3-debugsourcerocky-upgrade-gtk3-develrocky-upgrade-gtk3-devel-debuginforocky-upgrade-gtk3-immodule-ximrocky-upgrade-gtk3-immodule-xim-debuginforocky-upgrade-librawrocky-upgrade-libraw-debuginforocky-upgrade-libraw-debugsourcerocky-upgrade-libraw-develrocky-upgrade-mutterrocky-upgrade-mutter-debuginforocky-upgrade-mutter-debugsourcerocky-upgrade-mutter-develrocky-upgrade-vinorocky-upgrade-vino-debuginforocky-upgrade-vino-debugsourcerocky-upgrade-webkit2gtk3rocky-upgrade-webkit2gtk3-debuginforocky-upgrade-webkit2gtk3-debugsourcerocky-upgrade-webkit2gtk3-develrocky-upgrade-webkit2gtk3-devel-debuginforocky-upgrade-webkit2gtk3-jscrocky-upgrade-webkit2gtk3-jsc-debuginforocky-upgrade-webkit2gtk3-jsc-develrocky-upgrade-webkit2gtk3-jsc-devel-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.