RHSA-2020:4451: Moderate: SUSE Liberty Linux Moderate: GNOME security, bug fix, and enhancement update

Update Advisories for SUSE Liberty Linux suse-liberty-linux-updates at lists.suse.com
Fri Mar 27 16:08:00 UTC 2026


# Moderate: GNOME security, bug fix, and enhancement update

Announcement ID: RHSA-2020:4451
Rating: Moderate

Cross-References:

  * CVE-2019-8625
  * CVE-2019-8710
  * CVE-2019-8720
  * CVE-2019-8743
  * CVE-2019-8764
  * CVE-2019-8766
  * CVE-2019-8769
  * CVE-2019-8771
  * CVE-2019-8782
  * CVE-2019-8783
  * CVE-2019-8808
  * CVE-2019-8811
  * CVE-2019-8812
  * CVE-2019-8813
  * CVE-2019-8814
  * CVE-2019-8815
  * CVE-2019-8816
  * CVE-2019-8819
  * CVE-2019-8820
  * CVE-2019-8823
  * CVE-2019-8835
  * CVE-2019-8844
  * CVE-2019-8846
  * CVE-2020-10018
  * CVE-2020-11793
  * CVE-2020-14391
  * CVE-2020-15503
  * CVE-2020-3862
  * CVE-2020-3864
  * CVE-2020-3865
  * CVE-2020-3867
  * CVE-2020-3868
  * CVE-2020-3885
  * CVE-2020-3894
  * CVE-2020-3895
  * CVE-2020-3897
  * CVE-2020-3899
  * CVE-2020-3900
  * CVE-2020-3901
  * CVE-2020-3902
  * CVE-2020-9802
  * CVE-2020-9803
  * CVE-2020-9805
  * CVE-2020-9806
  * CVE-2020-9807
  * CVE-2020-9843
  * CVE-2020-9850
  * CVE-2020-9862
  * CVE-2020-9893
  * CVE-2020-9894
  * CVE-2020-9895
  * CVE-2020-9915
  * CVE-2020-9925



CVSS scores:

  * CVE-2019-8625 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  * CVE-2019-8710 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8720 ( SUSE ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8743 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8764 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  * CVE-2019-8766 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8769 ( SUSE ): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
  * CVE-2019-8771 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  * CVE-2019-8782 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8783 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8808 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8811 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8812 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8813 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  * CVE-2019-8814 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8815 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8816 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8819 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8820 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8823 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2019-8835 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
  * CVE-2019-8844 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
  * CVE-2019-8846 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
  * CVE-2020-10018 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2020-11793 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
  * CVE-2020-15503 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2020-3862 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2020-3864 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
  * CVE-2020-3865 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2020-3867 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  * CVE-2020-3868 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2020-3885 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
  * CVE-2020-3894 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
  * CVE-2020-3895 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2020-3897 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2020-3899 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2020-3900 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2020-3901 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2020-3902 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  * CVE-2020-9802 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2020-9803 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
  * CVE-2020-9805 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
  * CVE-2020-9806 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
  * CVE-2020-9807 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
  * CVE-2020-9843 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
  * CVE-2020-9850 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  * CVE-2020-9862 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
  * CVE-2020-9893 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2020-9894 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
  * CVE-2020-9895 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2020-9915 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
  * CVE-2020-9925 ( SUSE ): 8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N

Affected Products:

  * SUSE Liberty Linux 8


An update that solves 53 vulnerabilities can now be installed.

## Description:

This security update provides a functional equivalent of RHSA-2020:4451. The original RedHat(R) advisory is available from the RedHat web site at http://rhn.redhat.com/errata/RHSA-2020-4451.html

## Package List:

  * SUSE Liberty Linux 8:
    * LibRaw 0.19.5-2.el8
    * PackageKit 1.1.12-6.el8
    * PackageKit-command-not-found 1.1.12-6.el8
    * PackageKit-cron 1.1.12-6.el8
    * PackageKit-glib 1.1.12-6.el8
    * PackageKit-gstreamer-plugin 1.1.12-6.el8
    * PackageKit-gtk3-module 1.1.12-6.el8
    * dleyna-renderer 0.6.0-3.el8
    * frei0r-plugins 1.6.1-7.el8
    * frei0r-plugins-opencv 1.6.1-7.el8
    * gdm 3.28.3-34.el8
    * gnome-classic-session 3.32.1-11.el8
    * gnome-control-center 3.28.2-22.el8
    * gnome-control-center-filesystem 3.28.2-22.el8
    * gnome-photos 3.28.1-3.el8
    * gnome-photos-tests 3.28.1-3.el8
    * gnome-remote-desktop 0.1.8-3.el8
    * gnome-session 3.28.1-10.el8
    * gnome-session-wayland-session 3.28.1-10.el8
    * gnome-session-xsession 3.28.1-10.el8
    * gnome-settings-daemon 3.32.0-11.el8
    * gnome-shell 3.32.2-20.el8
    * gnome-shell-extension-apps-menu 3.32.1-11.el8
    * gnome-shell-extension-auto-move-windows 3.32.1-11.el8
    * gnome-shell-extension-common 3.32.1-11.el8
    * gnome-shell-extension-dash-to-dock 3.32.1-11.el8
    * gnome-shell-extension-desktop-icons 3.32.1-11.el8
    * gnome-shell-extension-disable-screenshield 3.32.1-11.el8
    * gnome-shell-extension-drive-menu 3.32.1-11.el8
    * gnome-shell-extension-horizontal-workspaces 3.32.1-11.el8
    * gnome-shell-extension-launch-new-instance 3.32.1-11.el8
    * gnome-shell-extension-native-window-placement 3.32.1-11.el8
    * gnome-shell-extension-no-hot-corner 3.32.1-11.el8
    * gnome-shell-extension-panel-favorites 3.32.1-11.el8
    * gnome-shell-extension-places-menu 3.32.1-11.el8
    * gnome-shell-extension-screenshot-window-sizer 3.32.1-11.el8
    * gnome-shell-extension-systemMonitor 3.32.1-11.el8
    * gnome-shell-extension-top-icons 3.32.1-11.el8
    * gnome-shell-extension-updates-dialog 3.32.1-11.el8
    * gnome-shell-extension-user-theme 3.32.1-11.el8
    * gnome-shell-extension-window-grouper 3.32.1-11.el8
    * gnome-shell-extension-window-list 3.32.1-11.el8
    * gnome-shell-extension-windowsNavigator 3.32.1-11.el8
    * gnome-shell-extension-workspace-indicator 3.32.1-11.el8
    * gnome-terminal 3.28.3-2.el8
    * gnome-terminal-nautilus 3.28.3-2.el8
    * gsettings-desktop-schemas 3.32.0-5.el8
    * gsettings-desktop-schemas-devel 3.32.0-5.el8
    * gtk-update-icon-cache 3.22.30-6.el8
    * gtk3 3.22.30-6.el8
    * gtk3-devel 3.22.30-6.el8
    * gtk3-immodule-xim 3.22.30-6.el8
    * gvfs 1.36.2-10.el8
    * gvfs-afc 1.36.2-10.el8
    * gvfs-afp 1.36.2-10.el8
    * gvfs-archive 1.36.2-10.el8
    * gvfs-client 1.36.2-10.el8
    * gvfs-devel 1.36.2-10.el8
    * gvfs-fuse 1.36.2-10.el8
    * gvfs-goa 1.36.2-10.el8
    * gvfs-gphoto2 1.36.2-10.el8
    * gvfs-mtp 1.36.2-10.el8
    * gvfs-smb 1.36.2-10.el8
    * libsoup 2.62.3-2.el8
    * libsoup-devel 2.62.3-2.el8
    * mutter 3.32.2-48.el8
    * nautilus 3.28.1-14.el8
    * nautilus-extensions 3.28.1-14.el8
    * pipewire 0.3.6-1.el8
    * pipewire-devel 0.3.6-1.el8
    * pipewire-doc 0.3.6-1.el8
    * pipewire-libs 0.3.6-1.el8
    * pipewire-utils 0.3.6-1.el8
    * pipewire0.2-devel 0.2.7-6.el8
    * pipewire0.2-libs 0.2.7-6.el8
    * potrace 1.15-3.el8
    * python3-gobject 3.28.3-2.el8
    * python3-gobject-base 3.28.3-2.el8
    * tracker 2.1.5-2.el8
    * vte-profile 0.52.4-2.el8
    * vte291 0.52.4-2.el8
    * webkit2gtk3 2.28.4-1.el8
    * webkit2gtk3-devel 2.28.4-1.el8
    * webkit2gtk3-jsc 2.28.4-1.el8
    * webkit2gtk3-jsc-devel 2.28.4-1.el8
    * webrtc-audio-processing 0.3-9.el8
    * xdg-desktop-portal 1.6.0-2.el8
    * xdg-desktop-portal-gtk 1.6.0-1.el8

## References:

  * https://www.suse.com/security/cve/CVE-2019-8625.html
  * https://www.suse.com/security/cve/CVE-2019-8710.html
  * https://www.suse.com/security/cve/CVE-2019-8720.html
  * https://www.suse.com/security/cve/CVE-2019-8743.html
  * https://www.suse.com/security/cve/CVE-2019-8764.html
  * https://www.suse.com/security/cve/CVE-2019-8766.html
  * https://www.suse.com/security/cve/CVE-2019-8769.html
  * https://www.suse.com/security/cve/CVE-2019-8771.html
  * https://www.suse.com/security/cve/CVE-2019-8782.html
  * https://www.suse.com/security/cve/CVE-2019-8783.html
  * https://www.suse.com/security/cve/CVE-2019-8808.html
  * https://www.suse.com/security/cve/CVE-2019-8811.html
  * https://www.suse.com/security/cve/CVE-2019-8812.html
  * https://www.suse.com/security/cve/CVE-2019-8813.html
  * https://www.suse.com/security/cve/CVE-2019-8814.html
  * https://www.suse.com/security/cve/CVE-2019-8815.html
  * https://www.suse.com/security/cve/CVE-2019-8816.html
  * https://www.suse.com/security/cve/CVE-2019-8819.html
  * https://www.suse.com/security/cve/CVE-2019-8820.html
  * https://www.suse.com/security/cve/CVE-2019-8823.html
  * https://www.suse.com/security/cve/CVE-2019-8835.html
  * https://www.suse.com/security/cve/CVE-2019-8844.html
  * https://www.suse.com/security/cve/CVE-2019-8846.html
  * https://www.suse.com/security/cve/CVE-2020-10018.html
  * https://www.suse.com/security/cve/CVE-2020-11793.html
  * https://www.suse.com/security/cve/CVE-2020-14391.html
  * https://www.suse.com/security/cve/CVE-2020-15503.html
  * https://www.suse.com/security/cve/CVE-2020-3862.html
  * https://www.suse.com/security/cve/CVE-2020-3864.html
  * https://www.suse.com/security/cve/CVE-2020-3865.html
  * https://www.suse.com/security/cve/CVE-2020-3867.html
  * https://www.suse.com/security/cve/CVE-2020-3868.html
  * https://www.suse.com/security/cve/CVE-2020-3885.html
  * https://www.suse.com/security/cve/CVE-2020-3894.html
  * https://www.suse.com/security/cve/CVE-2020-3895.html
  * https://www.suse.com/security/cve/CVE-2020-3897.html
  * https://www.suse.com/security/cve/CVE-2020-3899.html
  * https://www.suse.com/security/cve/CVE-2020-3900.html
  * https://www.suse.com/security/cve/CVE-2020-3901.html
  * https://www.suse.com/security/cve/CVE-2020-3902.html
  * https://www.suse.com/security/cve/CVE-2020-9802.html
  * https://www.suse.com/security/cve/CVE-2020-9803.html
  * https://www.suse.com/security/cve/CVE-2020-9805.html
  * https://www.suse.com/security/cve/CVE-2020-9806.html
  * https://www.suse.com/security/cve/CVE-2020-9807.html
  * https://www.suse.com/security/cve/CVE-2020-9843.html
  * https://www.suse.com/security/cve/CVE-2020-9850.html
  * https://www.suse.com/security/cve/CVE-2020-9862.html
  * https://www.suse.com/security/cve/CVE-2020-9893.html
  * https://www.suse.com/security/cve/CVE-2020-9894.html
  * https://www.suse.com/security/cve/CVE-2020-9895.html
  * https://www.suse.com/security/cve/CVE-2020-9915.html
  * https://www.suse.com/security/cve/CVE-2020-9925.html


More information about the suse-liberty-linux-updates mailing list