8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.961 High
EPSS
Percentile
99.5%
GNOME is the default desktop environment of AlmaLinux.
Security Fix(es):
evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459)
gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
errata.almalinux.org/8/ALSA-2019-3553.html
vulners.com/cve/CVE-2019-11070
vulners.com/cve/CVE-2019-11459
vulners.com/cve/CVE-2019-12795
vulners.com/cve/CVE-2019-3820
vulners.com/cve/CVE-2019-6237
vulners.com/cve/CVE-2019-6251
vulners.com/cve/CVE-2019-8506
vulners.com/cve/CVE-2019-8518
vulners.com/cve/CVE-2019-8523
vulners.com/cve/CVE-2019-8524
vulners.com/cve/CVE-2019-8535
vulners.com/cve/CVE-2019-8536
vulners.com/cve/CVE-2019-8544
vulners.com/cve/CVE-2019-8551
vulners.com/cve/CVE-2019-8558
vulners.com/cve/CVE-2019-8559
vulners.com/cve/CVE-2019-8563
vulners.com/cve/CVE-2019-8571
vulners.com/cve/CVE-2019-8583
vulners.com/cve/CVE-2019-8584
vulners.com/cve/CVE-2019-8586
vulners.com/cve/CVE-2019-8587
vulners.com/cve/CVE-2019-8594
vulners.com/cve/CVE-2019-8595
vulners.com/cve/CVE-2019-8596
vulners.com/cve/CVE-2019-8597
vulners.com/cve/CVE-2019-8601
vulners.com/cve/CVE-2019-8607
vulners.com/cve/CVE-2019-8608
vulners.com/cve/CVE-2019-8609
vulners.com/cve/CVE-2019-8610
vulners.com/cve/CVE-2019-8611
vulners.com/cve/CVE-2019-8615
vulners.com/cve/CVE-2019-8619
vulners.com/cve/CVE-2019-8622
vulners.com/cve/CVE-2019-8623
vulners.com/cve/CVE-2019-8666
vulners.com/cve/CVE-2019-8671
vulners.com/cve/CVE-2019-8672
vulners.com/cve/CVE-2019-8673
vulners.com/cve/CVE-2019-8676
vulners.com/cve/CVE-2019-8677
vulners.com/cve/CVE-2019-8679
vulners.com/cve/CVE-2019-8681
vulners.com/cve/CVE-2019-8686
vulners.com/cve/CVE-2019-8687
vulners.com/cve/CVE-2019-8689
vulners.com/cve/CVE-2019-8690
vulners.com/cve/CVE-2019-8726
vulners.com/cve/CVE-2019-8735
vulners.com/cve/CVE-2019-8768
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.961 High
EPSS
Percentile
99.5%