Debian Package Tracker
Register | Log in
Subscribe

gnome-shell

graphical shell for the GNOME desktop

Choose email to subscribe with

general
  • source: gnome-shell (main)
  • version: 42.1-1
  • maintainer: Debian GNOME Maintainers (archive) (DMD)
  • uploaders: Jeremy Bicha [DMD] – Iain Lane [DMD]
  • arch: all
  • std-ver: 4.6.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.22.3-3
  • o-o-sec: 3.22.3-3+deb9u1
  • oldstable: 3.30.2-11~deb10u2
  • stable: 3.38.6-1~deb11u1
  • testing: 42.1-1
  • unstable: 42.1-1
versioned links
  • 3.22.3-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.22.3-3+deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.30.2-11~deb10u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.38.6-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 42.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • gnome-shell (357 bugs: 1, 325, 31, 0)
  • gnome-shell-common (2 bugs: 0, 2, 0, 0)
  • gnome-shell-extension-prefs (2 bugs: 0, 2, 0, 0)
action needed
2 security issues in stretch high

There are 2 open security issues in stretch.

1 important issue:
  • CVE-2021-20315: A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.
1 issue postponed or untriaged:
  • CVE-2019-3820: (needs triaging) It was discovered that the gnome-shell lock screen since version 3.15.91 did not properly restrict all contextual actions. An attacker with physical access to a locked workstation could invoke certain keyboard shortcuts, and potentially other actions.
Created: 2021-09-23 Last update: 2022-05-19 05:36
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2021-20315: A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.
Created: 2021-09-23 Last update: 2022-05-19 05:36
1 security issue in buster high

There is 1 open security issue in buster.

1 important issue:
  • CVE-2021-20315: A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.
Created: 2021-09-23 Last update: 2022-05-19 05:36
1 security issue in bullseye high

There is 1 open security issue in bullseye.

1 important issue:
  • CVE-2021-20315: A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.
Created: 2021-09-23 Last update: 2022-05-19 05:36
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2021-20315: A locking protection bypass flaw was found in some versions of gnome-shell as shipped within CentOS Stream 8, when the "Application menu" or "Window list" GNOME extensions are enabled. This flaw allows a physical attacker who has access to a locked system to kill existing applications and start new ones as the locked user, even if the session is still locked.
Created: 2021-09-23 Last update: 2022-05-19 05:36
lintian reports 4 errors and 14 warnings high
Lintian reports 4 errors and 14 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2022-01-01 Last update: 2022-01-01 04:32
2 bugs tagged patch in the BTS normal
The BTS contains patches fixing 2 bugs, consider including or untagging them.
Created: 2021-08-14 Last update: 2022-05-22 14:32
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.6.0).
Created: 2022-05-11 Last update: 2022-05-14 00:55
news
[rss feed]
  • [2022-05-19] gnome-shell 42.1-1 MIGRATED to testing (Debian testing watch)
  • [2022-05-13] Accepted gnome-shell 42.1-1 (source) into unstable (Jeremy Bicha)
  • [2022-04-25] Accepted gnome-shell 42.0-5 (source) into experimental (Simon McVittie)
  • [2022-04-25] gnome-shell 42.0-4 MIGRATED to testing (Debian testing watch)
  • [2022-04-19] Accepted gnome-shell 42.0-4 (source) into unstable (Simon McVittie)
  • [2022-04-19] gnome-shell 42.0-3 MIGRATED to testing (Debian testing watch)
  • [2022-04-13] Accepted gnome-shell 42.0-3 (source) into unstable (Simon McVittie)
  • [2022-04-05] gnome-shell 42.0-2 MIGRATED to testing (Debian testing watch)
  • [2022-03-28] Accepted gnome-shell 42.0-2 (source) into unstable (Jeremy Bicha)
  • [2022-03-14] Accepted gnome-shell 42.0-1 (source) into experimental (Jeremy Bicha)
  • [2022-03-09] Accepted gnome-shell 42~rc-1 (source) into experimental (Jeremy Bicha)
  • [2022-02-27] gnome-shell 41.4-1 MIGRATED to testing (Debian testing watch)
  • [2022-02-23] Accepted gnome-shell 42~beta-1 (source) into experimental (Marco Trevisan (Treviño)) (signed by: Marco Trevisan)
  • [2022-02-21] Accepted gnome-shell 41.4-1 (source) into unstable (Simon McVittie)
  • [2022-02-21] gnome-shell 41.3-2 MIGRATED to testing (Debian testing watch)
  • [2022-02-15] Accepted gnome-shell 41.3-2 (source) into unstable (Simon McVittie)
  • [2022-01-31] gnome-shell 41.3-1 MIGRATED to testing (Debian testing watch)
  • [2022-01-25] Accepted gnome-shell 41.3-1 (source) into unstable (Marco Trevisan (Treviño)) (signed by: Marco Trevisan)
  • [2021-12-28] gnome-shell 41.2-1 MIGRATED to testing (Debian testing watch)
  • [2021-12-22] Accepted gnome-shell 41.2-1 (source) into unstable (Simon McVittie)
  • [2021-11-11] gnome-shell 41.1-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-11] gnome-shell 41.1-1 MIGRATED to testing (Debian testing watch)
  • [2021-11-05] Accepted gnome-shell 41.1-1 (source) into unstable (Simon McVittie)
  • [2021-10-22] gnome-shell 41.0-2 MIGRATED to testing (Debian testing watch)
  • [2021-10-16] Accepted gnome-shell 41.0-2 (source) into unstable (Simon McVittie)
  • [2021-10-10] Accepted gnome-shell 41.0-1 (source) into experimental (Simon McVittie)
  • [2021-09-30] gnome-shell 40.5-1 MIGRATED to testing (Debian testing watch)
  • [2021-09-25] Accepted gnome-shell 3.38.6-1~deb11u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Simon McVittie)
  • [2021-09-24] Accepted gnome-shell 40.5-1 (source) into unstable (Marco Trevisan (Treviño)) (signed by: Marco Trevisan)
  • [2021-09-19] gnome-shell 40.4-3 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 349 361
  • RC: 1
  • I&N: 320 329
  • M&W: 28 31
  • F&P: 0
  • patch: 2
  • NC: 1
links
  • homepage
  • lintian (4, 14)
  • buildd: logs, clang, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 94)
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 42.1-0ubuntu1
  • 425 bugs (4 patches)
  • patches for 42.1-0ubuntu1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing