Anolis OS update for gnome-shell



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-43090
CWE-ID CWE-264
Exploitation vector Local
Public exploit N/A
Vulnerable software
Anolis OS
Operating systems & Components / Operating system

gnome-shell-doc
Operating systems & Components / Operating system package or component

gnome-shell
Operating systems & Components / Operating system package or component

Vendor OpenAnolis

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU81043

Risk: Low

CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-43090

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due to certain key combinations remain active when the user session is locked. An attacker with physical access to device can activate the "single window mode" and "video" buttons in GNOME Screenshot utility by pressing twice the "V" then once the "W" key and record screen or make screenshots.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Anolis OS: 23

gnome-shell-doc: before 44.1-2

gnome-shell: before 44.1-2

CPE2.3 External links

https://anas.openanolis.cn/errata/detail/ANSA-2025:0235


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###