Download
| Alert*
oval:org.secpod.oval:def:66830
GNOME is the default desktop environment of Red Hat Enterprise Linux. Security Fix: * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp * gdm: lock screen bypass when timed login is enabled * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c * ... oval:org.secpod.oval:def:116070 GDM, the GNOME Display Manager, handles authentication-related backend functionality for logging in a user and unlocking the user's session after it's been locked. GDM also provides functionality for initiating user-switching, so more than one user can be logged in at the same time. It handl ... oval:org.secpod.oval:def:704500 gdm3: GNOME Display Manager GDM could give unauthorized access to a different user. oval:org.secpod.oval:def:1900010 A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user"s session. oval:org.secpod.oval:def:51223 gdm3: GNOME Display Manager GDM could give unauthorized access to a different user. oval:org.secpod.oval:def:2000436 A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user"s session. oval:org.secpod.oval:def:1504532 accountsservice [0.6.50-8] - Dont set HasNoUsers=true if realmd has providers Related: #1750516 appstream-data [8-20191129] - Regenerate the RHEL metadata to include the latest evince changes - Resolves: #1768461 clutter [1.26.2-8] - rebuild to get the new in 8.2.0 - plus address #1785233 evince [3. ... oval:org.secpod.oval:def:2500093 GNOME is the default desktop environment of AlmaLinux. oval:org.secpod.oval:def:69544 GNOME is the default desktop environment of Red Hat Enterprise Linux. Security Fix: * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp * gdm: lock screen bypass when timed login is enabled * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c * ... |