6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
8.1 High
AI Score
Confidence
High
5.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:N/I:N/A:C
0.061 Low
EPSS
Percentile
93.4%
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
The following packages have been upgraded to a later upstream version: ipa (4.8.7), softhsm (2.6.0), opendnssec (2.1.6). (BZ#1759888, BZ#1818765, BZ#1818877)
Security Fix(es):
js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)
bootstrap: XSS in the data-target attribute (CVE-2016-10735)
bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)
bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip (CVE-2018-14042)
bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676)
bootstrap: XSS in the affix configuration target property (CVE-2018-20677)
bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331)
js-jquery: Prototype pollution in object’s prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)
jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)
ipa: No password length restriction leads to denial of service (CVE-2020-1722)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section.
bugzilla.redhat.com/show_bug.cgi?id=1399546
bugzilla.redhat.com/show_bug.cgi?id=1430365
bugzilla.redhat.com/show_bug.cgi?id=1488732
bugzilla.redhat.com/show_bug.cgi?id=1585020
bugzilla.redhat.com/show_bug.cgi?id=1601614
bugzilla.redhat.com/show_bug.cgi?id=1601617
bugzilla.redhat.com/show_bug.cgi?id=1651577
bugzilla.redhat.com/show_bug.cgi?id=1668082
bugzilla.redhat.com/show_bug.cgi?id=1668089
bugzilla.redhat.com/show_bug.cgi?id=1668097
bugzilla.redhat.com/show_bug.cgi?id=1686454
bugzilla.redhat.com/show_bug.cgi?id=1701233
bugzilla.redhat.com/show_bug.cgi?id=1701972
bugzilla.redhat.com/show_bug.cgi?id=1746830
bugzilla.redhat.com/show_bug.cgi?id=1750893
bugzilla.redhat.com/show_bug.cgi?id=1751295
bugzilla.redhat.com/show_bug.cgi?id=1757045
bugzilla.redhat.com/show_bug.cgi?id=1759888
bugzilla.redhat.com/show_bug.cgi?id=1768156
bugzilla.redhat.com/show_bug.cgi?id=1777806
bugzilla.redhat.com/show_bug.cgi?id=1793071
bugzilla.redhat.com/show_bug.cgi?id=1801698
bugzilla.redhat.com/show_bug.cgi?id=1802471
bugzilla.redhat.com/show_bug.cgi?id=1809835
bugzilla.redhat.com/show_bug.cgi?id=1810154
bugzilla.redhat.com/show_bug.cgi?id=1810179
bugzilla.redhat.com/show_bug.cgi?id=1813330
bugzilla.redhat.com/show_bug.cgi?id=1816784
bugzilla.redhat.com/show_bug.cgi?id=1818765
bugzilla.redhat.com/show_bug.cgi?id=1818877
bugzilla.redhat.com/show_bug.cgi?id=1828406
bugzilla.redhat.com/show_bug.cgi?id=1831732
bugzilla.redhat.com/show_bug.cgi?id=1831935
bugzilla.redhat.com/show_bug.cgi?id=1832331
bugzilla.redhat.com/show_bug.cgi?id=1833266
bugzilla.redhat.com/show_bug.cgi?id=1834264
bugzilla.redhat.com/show_bug.cgi?id=1834909
bugzilla.redhat.com/show_bug.cgi?id=1845211
bugzilla.redhat.com/show_bug.cgi?id=1845537
bugzilla.redhat.com/show_bug.cgi?id=1845596
bugzilla.redhat.com/show_bug.cgi?id=1846352
bugzilla.redhat.com/show_bug.cgi?id=1846434
bugzilla.redhat.com/show_bug.cgi?id=1847999
bugzilla.redhat.com/show_bug.cgi?id=1849914
bugzilla.redhat.com/show_bug.cgi?id=1851411
bugzilla.redhat.com/show_bug.cgi?id=1852244
bugzilla.redhat.com/show_bug.cgi?id=1853263
bugzilla.redhat.com/show_bug.cgi?id=1857157
bugzilla.redhat.com/show_bug.cgi?id=1858318
bugzilla.redhat.com/show_bug.cgi?id=1859213
bugzilla.redhat.com/show_bug.cgi?id=1863079
bugzilla.redhat.com/show_bug.cgi?id=1863616
bugzilla.redhat.com/show_bug.cgi?id=1866291
bugzilla.redhat.com/show_bug.cgi?id=1866938
bugzilla.redhat.com/show_bug.cgi?id=1868432
bugzilla.redhat.com/show_bug.cgi?id=1869311
bugzilla.redhat.com/show_bug.cgi?id=1870202
bugzilla.redhat.com/show_bug.cgi?id=1874015
bugzilla.redhat.com/show_bug.cgi?id=1875348
bugzilla.redhat.com/show_bug.cgi?id=1879604
errata.rockylinux.org/RLSA-2020:4670
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
8.1 High
AI Score
Confidence
High
5.4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:N/I:N/A:C
0.061 Low
EPSS
Percentile
93.4%