Rapid7 Vulnerability & Exploit Database

Rocky Linux: CVE-2021-1799: GNOME (RLSA-2021-4381)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Rocky Linux: CVE-2021-1799: GNOME (RLSA-2021-4381)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
04/02/2021
Created
03/13/2024
Added
03/12/2024
Modified
08/28/2024

Description

A port redirection issue was addressed with additional port validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. A malicious website may be able to access restricted ports on arbitrary servers.

Solution(s)

  • rocky-upgrade-LibRaw
  • rocky-upgrade-LibRaw-debuginfo
  • rocky-upgrade-LibRaw-debugsource
  • rocky-upgrade-LibRaw-devel
  • rocky-upgrade-accountsservice
  • rocky-upgrade-accountsservice-debuginfo
  • rocky-upgrade-accountsservice-debugsource
  • rocky-upgrade-accountsservice-devel
  • rocky-upgrade-accountsservice-libs
  • rocky-upgrade-accountsservice-libs-debuginfo
  • rocky-upgrade-gdm
  • rocky-upgrade-gdm-debuginfo
  • rocky-upgrade-gdm-debugsource
  • rocky-upgrade-gnome-autoar
  • rocky-upgrade-gnome-autoar-debuginfo
  • rocky-upgrade-gnome-autoar-debugsource
  • rocky-upgrade-gnome-calculator
  • rocky-upgrade-gnome-calculator-debuginfo
  • rocky-upgrade-gnome-calculator-debugsource
  • rocky-upgrade-gnome-control-center
  • rocky-upgrade-gnome-control-center-debuginfo
  • rocky-upgrade-gnome-control-center-debugsource
  • rocky-upgrade-gnome-online-accounts
  • rocky-upgrade-gnome-online-accounts-debuginfo
  • rocky-upgrade-gnome-online-accounts-debugsource
  • rocky-upgrade-gnome-online-accounts-devel
  • rocky-upgrade-gnome-session
  • rocky-upgrade-gnome-session-debuginfo
  • rocky-upgrade-gnome-session-debugsource
  • rocky-upgrade-gnome-session-kiosk-session
  • rocky-upgrade-gnome-session-wayland-session
  • rocky-upgrade-gnome-session-xsession
  • rocky-upgrade-gnome-settings-daemon
  • rocky-upgrade-gnome-settings-daemon-debuginfo
  • rocky-upgrade-gnome-settings-daemon-debugsource
  • rocky-upgrade-gnome-shell
  • rocky-upgrade-gnome-shell-debuginfo
  • rocky-upgrade-gnome-shell-debugsource
  • rocky-upgrade-gnome-software
  • rocky-upgrade-gnome-software-debuginfo
  • rocky-upgrade-gnome-software-debugsource
  • rocky-upgrade-gnome-software-devel
  • rocky-upgrade-gsettings-desktop-schemas
  • rocky-upgrade-gsettings-desktop-schemas-devel
  • rocky-upgrade-gtk-update-icon-cache
  • rocky-upgrade-gtk-update-icon-cache-debuginfo
  • rocky-upgrade-gtk3
  • rocky-upgrade-gtk3-debuginfo
  • rocky-upgrade-gtk3-debugsource
  • rocky-upgrade-gtk3-devel
  • rocky-upgrade-gtk3-devel-debuginfo
  • rocky-upgrade-gtk3-immodule-xim
  • rocky-upgrade-gtk3-immodule-xim-debuginfo
  • rocky-upgrade-mutter
  • rocky-upgrade-mutter-debuginfo
  • rocky-upgrade-mutter-debugsource
  • rocky-upgrade-mutter-devel
  • rocky-upgrade-vino
  • rocky-upgrade-vino-debuginfo
  • rocky-upgrade-vino-debugsource
  • rocky-upgrade-webkit2gtk3
  • rocky-upgrade-webkit2gtk3-debuginfo
  • rocky-upgrade-webkit2gtk3-debugsource
  • rocky-upgrade-webkit2gtk3-devel
  • rocky-upgrade-webkit2gtk3-devel-debuginfo
  • rocky-upgrade-webkit2gtk3-jsc
  • rocky-upgrade-webkit2gtk3-jsc-debuginfo
  • rocky-upgrade-webkit2gtk3-jsc-devel
  • rocky-upgrade-webkit2gtk3-jsc-devel-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;