8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.961 High
EPSS
Percentile
99.5%
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459)
gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section.
bugzilla.redhat.com/show_bug.cgi?id=1662193
bugzilla.redhat.com/show_bug.cgi?id=1667136
bugzilla.redhat.com/show_bug.cgi?id=1673011
bugzilla.redhat.com/show_bug.cgi?id=1674382
bugzilla.redhat.com/show_bug.cgi?id=1679127
bugzilla.redhat.com/show_bug.cgi?id=1680164
bugzilla.redhat.com/show_bug.cgi?id=1685811
bugzilla.redhat.com/show_bug.cgi?id=1687949
bugzilla.redhat.com/show_bug.cgi?id=1690506
bugzilla.redhat.com/show_bug.cgi?id=1696708
bugzilla.redhat.com/show_bug.cgi?id=1698520
bugzilla.redhat.com/show_bug.cgi?id=1698884
bugzilla.redhat.com/show_bug.cgi?id=1698923
bugzilla.redhat.com/show_bug.cgi?id=1698929
bugzilla.redhat.com/show_bug.cgi?id=1698930
bugzilla.redhat.com/show_bug.cgi?id=1704355
bugzilla.redhat.com/show_bug.cgi?id=1704360
bugzilla.redhat.com/show_bug.cgi?id=1704378
bugzilla.redhat.com/show_bug.cgi?id=1705583
bugzilla.redhat.com/show_bug.cgi?id=1706793
bugzilla.redhat.com/show_bug.cgi?id=1709937
bugzilla.redhat.com/show_bug.cgi?id=1713080
bugzilla.redhat.com/show_bug.cgi?id=1713330
bugzilla.redhat.com/show_bug.cgi?id=1713453
bugzilla.redhat.com/show_bug.cgi?id=1713685
bugzilla.redhat.com/show_bug.cgi?id=1715738
bugzilla.redhat.com/show_bug.cgi?id=1715761
bugzilla.redhat.com/show_bug.cgi?id=1715765
bugzilla.redhat.com/show_bug.cgi?id=1716295
bugzilla.redhat.com/show_bug.cgi?id=1716771
bugzilla.redhat.com/show_bug.cgi?id=1718133
bugzilla.redhat.com/show_bug.cgi?id=1719241
bugzilla.redhat.com/show_bug.cgi?id=1719279
bugzilla.redhat.com/show_bug.cgi?id=1719779
bugzilla.redhat.com/show_bug.cgi?id=1720481
bugzilla.redhat.com/show_bug.cgi?id=1721195
bugzilla.redhat.com/show_bug.cgi?id=1721575
bugzilla.redhat.com/show_bug.cgi?id=1722047
bugzilla.redhat.com/show_bug.cgi?id=1722844
bugzilla.redhat.com/show_bug.cgi?id=1723467
bugzilla.redhat.com/show_bug.cgi?id=1723836
bugzilla.redhat.com/show_bug.cgi?id=1724551
bugzilla.redhat.com/show_bug.cgi?id=1725101
bugzilla.redhat.com/show_bug.cgi?id=1725107
bugzilla.redhat.com/show_bug.cgi?id=1725120
bugzilla.redhat.com/show_bug.cgi?id=1725555
bugzilla.redhat.com/show_bug.cgi?id=1725741
bugzilla.redhat.com/show_bug.cgi?id=1725766
bugzilla.redhat.com/show_bug.cgi?id=1725854
bugzilla.redhat.com/show_bug.cgi?id=1726093
bugzilla.redhat.com/show_bug.cgi?id=1726505
bugzilla.redhat.com/show_bug.cgi?id=1726656
bugzilla.redhat.com/show_bug.cgi?id=1728277
bugzilla.redhat.com/show_bug.cgi?id=1731372
bugzilla.redhat.com/show_bug.cgi?id=1735382
bugzilla.redhat.com/show_bug.cgi?id=1737326
bugzilla.redhat.com/show_bug.cgi?id=1739116
bugzilla.redhat.com/show_bug.cgi?id=1739117
bugzilla.redhat.com/show_bug.cgi?id=1741547
errata.rockylinux.org/RLSA-2019:3553
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.9 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.961 High
EPSS
Percentile
99.5%