Mageia 2021-0316: gnome-shell security update | LinuxSecurity.com

Advisories

MGASA-2021-0316 - Updated gnome-shell package fixes a security vulnerability

Publication date: 08 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0316.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2020-17489

An issue was discovered in certain configurations of GNOME gnome-shell through
3.36.4. When logging out of an account, the password box from the login dialog
reappears with the password still visible. If the user had decided to have the
password shown in cleartext at login time, it is then visible for a brief
moment upon a logout. (If the password were never shown in cleartext, only the
password length is revealed.) (CVE-2020-17489).

References:
- https://bugs.mageia.org/show_bug.cgi?id=27303
- https://www.debian.org/lts/security/2020/dla-2374
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17489

SRPMS:
- 7/core/gnome-shell-3.32.1-2.2.mga7

Mageia 2021-0316: gnome-shell security update

An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4

Summary

An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4. When logging out of an account, the password box from the login dialog reappears with the password still visible. If the user had decided to have the password shown in cleartext at login time, it is then visible for a brief moment upon a logout. (If the password were never shown in cleartext, only the password length is revealed.) (CVE-2020-17489).

References

- https://bugs.mageia.org/show_bug.cgi?id=27303

- https://www.debian.org/lts/security/2020/dla-2374

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17489

Resolution

MGASA-2021-0316 - Updated gnome-shell package fixes a security vulnerability

SRPMS

- 7/core/gnome-shell-3.32.1-2.2.mga7

Severity
Publication date: 08 Jul 2021
URL: https://advisories.mageia.org/MGASA-2021-0316.html
Type: security
CVE: CVE-2020-17489

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.