Please use CVE-2022-1736 for the gnome-remote-desktop user service being enabled on Ubuntu.
The Debian packaging, and derivatives of both Ubuntu and Debian, for gnome-remote-desktop are probably very similar. The Debian policy strongly encourages services to be running by default after installation[1]. Ubuntu, however, strongly discourages open ports by default[2].
So, while there may be identical code in the other distributions, this may or may not be considered a vulnerability by the other distributions, based on their own policies.
[2]: https://wiki.ubuntu.com/Security/Features#ports
"Default installations of Ubuntu must have no listening network services after initial install. Exceptions to this rule [enumerated exceptions elided]"
Please use CVE-2022-1736 for the gnome-remote- desktop user service being enabled on Ubuntu.
The Debian packaging, and derivatives of both Ubuntu and Debian, for gnome-remote- desktop are probably very similar. The Debian policy strongly encourages services to be running by default after installation[1]. Ubuntu, however, strongly discourages open ports by default[2].
So, while there may be identical code in the other distributions, this may or may not be considered a vulnerability by the other distributions, based on their own policies.
Thanks
[1]: https:/ /www.debian. org/doc/ debian- policy/ ch-opersys. html#managing- the-links
"The default behaviour is to enable autostarting your package’s daemon"
[2]: https:/ /wiki.ubuntu. com/Security/ Features# ports
"Default installations of Ubuntu must have no listening network services after initial install. Exceptions to this rule [enumerated exceptions elided]"