8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.03 Low
EPSS
Percentile
90.7%
An update is available for mozjs52, gnome-tweaks, clutter, gnome-menus, mozjs60, baobab.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME is the default desktop environment of Rocky Linux.
Security Fix(es):
LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337)
gdm: lock screen bypass when timed login is enabled (CVE-2019-3825)
gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447)
gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448)
gvfs: mishandling of file’s user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
rocky | 8 | aarch64 | baobab | < 3.28.0-4.el8 | baobab-0:3.28.0-4.el8.aarch64.rpm |
rocky | 8 | x86_64 | baobab | < 3.28.0-4.el8 | baobab-0:3.28.0-4.el8.x86_64.rpm |
rocky | 8 | aarch64 | baobab-debuginfo | < 3.28.0-4.el8 | baobab-debuginfo-0:3.28.0-4.el8.aarch64.rpm |
rocky | 8 | x86_64 | baobab-debuginfo | < 3.28.0-4.el8 | baobab-debuginfo-0:3.28.0-4.el8.x86_64.rpm |
rocky | 8 | aarch64 | baobab-debugsource | < 3.28.0-4.el8 | baobab-debugsource-0:3.28.0-4.el8.aarch64.rpm |
rocky | 8 | x86_64 | baobab-debugsource | < 3.28.0-4.el8 | baobab-debugsource-0:3.28.0-4.el8.x86_64.rpm |
rocky | 8 | aarch64 | clutter | < 1.26.2-8.el8 | clutter-0:1.26.2-8.el8.aarch64.rpm |
rocky | 8 | i686 | clutter | < 1.26.2-8.el8 | clutter-0:1.26.2-8.el8.i686.rpm |
rocky | 8 | x86_64 | clutter | < 1.26.2-8.el8 | clutter-0:1.26.2-8.el8.x86_64.rpm |
rocky | 8 | aarch64 | clutter-debuginfo | < 1.26.2-8.el8 | clutter-debuginfo-0:1.26.2-8.el8.aarch64.rpm |
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.03 Low
EPSS
Percentile
90.7%